Wednesday, February 26

Virtual March - QuickTopic bulletin board
it took me a bunch of tries, but i did finally get through to the white house. after i made my comments, the woman on the other end said, "i'm hand writing all this... i think i'm getting a lump on my finger."

Tuesday, February 25

To the generally nice janitor who cleans my cubicle each evening:

COULD YOU PLEASE SHUT THE **** UP AND QUIT CUTTING DEALS ON YOUR CELL PHONE SO I CAN GET SOME WORK DONE NOW THAT THIS NOISY ARMPIT IS FINALLY EMPTY?

Thanks pal.
CNN.com - Diamond heist police arrest four - Feb. 25, 2003
Thieves forced open 120 safes in a number of vaults in a building in Antwerp's diamond centre over the weekend of February 15-16.



They reportedly changed the video tapes of the security cameras in the building to avoid being identified.

Monday, February 24

Deal May Freshen Up Google's Links
So how will the chattering of Blogger's 200,000 active users help Google improve its news judgment? The deal may be less about chatter than about links, said Meg Hourihan, who founded Pyra with Mr. Williams in 1999 and left in 2001 after a dispute over its direction, keeping a stake in the company. Ms. Hourihan said she was not familiar with Google's plans, but she said that it made sense for Google to be interested in gaining faster access to the links in Weblogs.







I thought they left because they weren't getting paid.
Do Scripters Suffer Discrimination?
Hey, if all those art majors and wanna-be fashion designers hadn't decided to become "web developers", maybe someone who can write an actual program in Perl might get some respect.

Seriously, scripting languages have been "tainted" by the Web. "If it's a script, it can't possibly be worth anything" is a pretty common mind-set these days.

While I've seen some pretty awful C and C code out there, it's nothing compared to the horror of amateur Perl or (shudder) Shell scripts.

It's interesting to consider that scripting languages have been able to ride Moore's Law to the extent that you can reasonably implement things in a scripting language hat would have really needed to be compiled a short time ago.

-Mark
Z Partners - Weblog
Our ever-increasing dependence on the microchip is enabled, in no small part, by a near-universally held idea about computers: no matter how complex and powerful microprocessors might become, in principle they are always rational, predictable, and 'debug-able' by the engineers who design them. As opposed to the messiness, ambiguity and complexity of the natural world, computers are structured, transparent and orderly - features that also make them trustworthy. We admit them into our lives because we believe (or assume) that we know what they

Sunday, February 23

KRT Wire | 02/22/2003 | Inexperience hurt shuttle analysis, engineers say
Several engineers here began conducting their own analysis after the crash - using the same data and procedures that were used in Houston during the flight. Their results are not only different, but they indicate that NASA had an emergency on its hands.



"We're redoing the analysis because we think it needs to be done differently," said another longtime shuttle engineer, an expert at calculating debris impact. "The re-analysis is finding things to be more harsh than the original."
Wired News: Why Did Google Want Blogger?
Cleveland said Google will likely use Blogger to develop sophisticated searches that utilize the rich metadata inherent in the RSS feeds from weblogs: who wrote what and when, what it linked to, what linked to it and its level of popularity with Web surfers.



Cleveland said the search tool his company built for Blogger did exactly this kind of indexing on individual posts, in real time.



"By doing this we were taking a couple of baby steps down the road of what some have called the semantic Web -- a Web ... where computers can understand, at some level, the meaning and context of a Web page or blog post," he explained in an e-mail.
Salon.com Technology | Use the blog, Luke
The true revolution promised by the rise of bloggerdom is not about journalism. It's about information management. The bloggers have the potential to do something far more original than offer up packaged opinions on the news of the day; they can actually help organize the Web in ways tailored to your minute-by-minute needs. Often dismissed as self-obsessed "vanity sites," the bloggers actually have an important collective role to play on the Web. But they're not challengers to the throne of the New York Times and the Wall Street Journal. They're challengers to the throne of Google.




Written 10 months before the acquistion of blogger by google. Hmmm..

Friday, February 21

E-Mails Reveal Shuttle Concerns (washingtonpost.com)
In one e-mail sent three days before the shuttle disintegrated on Feb. 1 as it hit the atmosphere, a Langley engineer complained that those managing Columbia's flight had chosen not to do simple studies to clarify what risks it would face on landing, and had treated such information "like the plague."
Spirit of Place
quoted from emails to all the family from Don, Cory's uncle, who's a UN nuclear weapons inspector in Iraq right now:



"I think that before Bush/Blair decide to start a war here they should both come and see what we see. From what any of us have seen there isn't anything here worth destroying. They have the usual military stuff, usual for a poorer state that has had sanctions for the last 12 years which means generally older and out-dated stuff. They don't have anything in the way of a nuclear program and for biological and chemical it is possible that they have something but no one seems to be able to find it if they do have it. So if we can't find it how will B B find it to destroy it?????????



All the machine equipment we have seen is old, perhaps even ancient. Not worth sending a 1 million dollar cruise missle to destroy that sort of stuff. Buildings are old and are in desparate need of repair. Most air conditioners we see sticking out the side of a building are terribly rusted and don't appear to be in opearation order. Destroy that?????



And when Saddam is gone what will happen to Iraq as a country? There are three main factions who will all be fighting for power and within these factions there will be fighting."



How will the Iraqi people benefit if they are bombed and killed? Where is the evidence that Saddam is a real threat to American security? Where is the evidence that invading Iraq will not destabilize the rest of the region and lead to more terrorist attacks? I have so many questions to which there are no answers.
Central Timetabling By Computer: A Review Of Existing Information
# Since a computerised central timetabling system will seek to meet all demands for accommodation, there may be difficulties when staff find they are no longer permitted to specify certain times when they do not wish to teach, such as Monday mornings or Friday afternoons.



# Some systems will allow such restrictions for individual lecturers, but there would have to be an institutional policy about who should be allowed to restrict their teaching times in this way. Similarly, most systems can include a restriction, if required, that would prevent any lecturers being scheduled to teach at 9-10 am and 5-6 pm, with nothing scheduled in between.
A Grateful Survey Of Information Architecture - English 6410 - Utah State University
Few [if any] sentences have exerted a greater influence on the American judicial system than the 1st Amendment to the US Constitution: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances."



Among the various exceptions officially recognized by the Supreme Court are issues dealing with slander, copyrights, and pornography. However, specific definitions and interpretations are often left to the community (i.e. local and state governments) in which an individual resides. Both private and public governing bodies tend to offer stricter standards than national laws; for example, students are expelled and/or employees fired for using racial slurs or any harassing comment. A lay definition may state that your rights of expression extend to the tip of my nose.



The CDA (Communications Decency Act, see http://www.epic.org/free_speech/exon_bill.txt) was passed by Congress in 1996, then signed into law by President Clinton, however the US Supreme Court ruled the following year that the Internet is protected by the First Amendment and the CDA was a violation of the First Amendment. To salvage this legislation, it was rewritten as COPA (Child Online Protection Act, see http://www.ggtech.com/hr774_ih.html) with the intent of amending the Communications Act of 1934 to allow freedom of speech on the Internet while simultaneously protecting children from unsuitable online material. COPA was combined and passed along with the Congressional Spending Bill of 1998.
OmniUpdate Web Content Management - Web Content Management home
Credit Card Payments - Payment Options - Student Information - Bursars Office - University of Louisville
Credit Card Payments





You can pay your student account by Master Card or Visa over the web.



Go to: Summary of Account. Put the amount you wish to pay in the first box at the bottom of the Summary of Account, then push the "Web credit card payment" button.

Contact - Registrar's Office - University of Louisville
Mailing Address

Registrar's Office

University of Louisville

Louisville, KY 40292




$247
From Lannon, John. Technical Communication. Ninth ed.



Glossary tips:



- Define all terms unfamiliar to an intelligent layperson. When in doubt, overdefining is safer than underdefining.



- Define all terms that have a unique meaning in your report.



- List all terms in alphabetical order



- On first use, place an asterisk in the text by each item defined in the glossary.



- List the glossary and the first page number in teh table of contents.





Online Technical Writing: Graphics and Tables
Mac OS X: MySQL on Mac OS X
In this article I'll give you an overview of MySQL's features and drawbacks, show you how to install MySQL on Mac OS X, and introduce you to some of MySQL's notable technical aspects.
Lindows Launches $799 Linux Laptop
here I am, writing from the floor of the Desktop Linux Summit in San Diego, where Michael Robertson, the founder and CEO of the Summit's local host company, Lindows, has done the same for a much smaller audience (several hundred vs. several thousand) but potentially a much larger market. At the top of his list of announcements is an item that drew a gasp from the audience: a 2.9 pound, $799 Linux laptop, the Lindows MobilePC.



Here are the stats:



* 933MHz VIA processor

* 256MB RAM

* USB 2.0

* Firewire

* Ethernet

* 12.1" 1024x768 TFT display

* PCMCIA slot

* Compact Flash slot



Michael Robertson tells me "It has the same mini-ITX form factor that's in the Lindows Media computer."



There's no WiFi or modem capabilities installed, but you can add a PCMCIA card for both. During the break I heard no complaints and plenty of kudos. (Nobody in the room had used one yet, though, other than Michael Robertson, who used the box to give his whole presentation.)

Thursday, February 20

Ready.gov - Be Informed - Explosions:Trapped in Debris - Visual Guide




a parody
Media Page www.4jhc.org
After the NBC news team got detained by police while interviewing the family outside of Duke University Medical Center, Mack and Jesica's parents were called into a board meeting with the hospital administrators and department heads. They were challenging Mack's power of attorney, attempting to restrict visitors, refusing the family to be able to take photographs of Jessica, wanting the photographs to be removed from the website that had any hospital personnel in them, wanting to limit Mack's access to Jessica and her medical information and restricting the press from entering the hospital. All the while, completely ignoring the pleas of her parents to have Mack retain all access to Jesica. This was a horrendous meeting with translator's, attorneys, etc., all present. In the midst of this conference, Senator Dole called Mack on his cell phone. Mack proceeded to tell Senator Dole in detail, what had happened during the surgery, after the surgery, about the media being detained, the hospital administrator wanting to restrict Mack's access to Jesica and the horrors of the past week. Everyone in the room was silent, as Mack explained the dire situation Jesica was facing to Senator Dole. Mack explained to her, that he was sitting in front of the hospital administrator right then. Senator Dole asked to speak with him. Mack said, "Sir, Senator Dole would like to speak with you." The administrator shook his head no in disbelief. Then, Senator Elizabeth Dole discussed with Mack, her concern for Jesica's and wanting to make sure that nothing happens to that "Sweet Baby." She made sure Mack had her cell phone number and told him to call her with whatever he needed and with continual updates on Jesica's condition. When Mack hung up the phone, the hospital administration ended the meeting promptly, by escorting Mack immediately upstairs to the ICU. There, they added Mack's daughters and attorney to the ICU visitors list. They let him once again take photographs of Jesica and they informed the head of the ICU ward, to assist Mr. Mahoney with whatever he needed. The hospital's tone instantly changed the minute Mack hung up the phone with Senator Dole.

Wednesday, February 19

Santa Fe Institute Bulletin: Winter 03
Basics of Grounded Theory Analysis:Emergence vs. Forcing
I, Barney G. Glaser, have come to the conclusion that it is up to me to write a cogent, clear correction to the many wrong ideas in Basics of qualitative Research by Anselm L. Strauss and Juliet Corbin, 1990, Sage Publications. The many wrong ideas in Basics of Qualitative Research are too subtle for the average reader and user of grounded theory to follow, to corn-pare to previous work and to critique. These readers should be set back on the correct path to discovery and theory generation using grounded theory.
This book, with its corrected view of the underlying logic of grounded theory offered in Basics, will enable researchers to get on with their research and keep up their productivity. It is better for the reader of this book to just follow a corrected version of Strauss' book and go forward with confidence that this correction will produce an emergent, grounded theory. Basics produces a forced, preconceived, full conceptual description, which is fine, but is not grounded theory.

Tuesday, February 18

The Tard Blog
I wanted him out of there. He was being rude and disobedient. He wouldn't go. This is when Riti Sped forms a brilliant plan.



I remember that Augusta had really enjoyed the play Hansel and Gretel that we had seen two weeks earlier. I gave my aide a bag of Hershey Kisses. She went out to the hall and laid them out in a scattered trail, leading to the office. I give Augusta a paper sack, and tell him there is a trail of treats laid out that will lead him to a prize. He jumps up and snatches the bag out of my hand. I had never before seen him move his big ass so fast.







He begins furiously picking up the chocolates. He was like a police dog searching for drugs. My aide followed Augusta out and all the way to the office.
Let's Get Snarky!: Archive Entry From Brad DeLong's Webjournal
Besides, people don't necessarily want a Smarter Stephen den Beste . Part of the joy is watching a man who knows nothing about anything except the innards of mobile phones trying to understand a complicated world around him with no sources of information other than the Internet.
Google and Larry Page: Archive Entry From Brad DeLong's Webjournal
By making Blogs the preferred system for publishing information in the first place, Google will be able to help improve the weaving and ranking processes even more reliably and in the otherwise untrustworthy world of the Internet, that will keep them on top. While other search engines are still trying to figure out how to turn their spidered information into a business, Google is focusing on what really matters, and that is reliability. The Blogosphere will benefit because Google will fund the development of the tools and they will be open source because the more of them they have out there the more valuable they are, because, can I say it again, Google does not sell search, it sells reliability, and every blogger and surfer and webmaster in the world is contributing to that. We do not get free services from Google, we pay for them with our clicks on their linked information. Pretty soon we will also be paying with our Blogging and we will be paid back with reliable information. That's an information economy; the information is the currency, knowledge is the payoff and reliability is marketable to those whose reliance on it is highest.

Google and Larry Page: Archive Entry From Brad DeLong's Webjournal
Larry Page: "It wasn't that we intended to build a search engine. We built a ranking system to deal with annotations. We wanted to annotate the web--build a system so that after you'd viewed a page you could click and see what smart comments other people had about it. But how do you decide who gets to annotate Yahoo? We needed to figure out how to choose which annotations people should look at, which meant that we needed to figure out which other sites contained comments we should classify as authoritative. Hence PageRank.

"Only later did we realize that PageRank was much more useful for search than for annotation..."

Monday, February 17

21 Killed in Panic to Exit Chicago Club (washingtonpost.com)
Blackwell said one man crushed between two people told him, " 'I can't breathe! I want you to hold my hand, man. If I don't make it, tell my mom that I love her!' He just basically collapsed."
reversible
:: Douglas Rushkoff - Weblog ::
Call it awful, but I realized that the judicial decision to give the 2000 election to Bush has left deeper scars on my psyche than watching the WTC fall (from my apartment window). It made me wonder if the 'system' is broken, the game is rigged, and no one of conscience will ever be allowed to actualize the Constitution ever again.



Close to the end of the meeting, we got on to the subject of the Showdown in Iraq. Gore said quite plainly, "Well, of course it's just a distraction. Nothing more." I nodded along, but only later thought to ask: a distraction from what?

Sunday, February 16

Gbloogle: what it all (may) mean - QuickTopic bulletin board
Joey deVilla 16

02-16-2003 08:05 PM ET (US)



Personally, my favourite amalgam of "Blogger" and "Google" is Booger.
DAREDEVIL / *** (PG-13)
Affleck is at home in plots of this size, having recently just tried to save Baltimore from nuclear annihilation and the world from "Armageddon," but Garner, Farrell and Duncan are relatively newer to action epics, although Garner did see Affleck off at the station when he took the trail from Pearl Harbor to New York, and Duncan was Balthazar in "The Scorpion King." They play their roles more or less as if they were real, which is a novelty in a movie like this, and Duncan in particular has a presence that makes the camera want to take a step back and protect its groin.
The similarity to Archive.org is intriguing me. Archive is fed by Alexa who are owned by Amazon. Amazon have shit-hot collaborative filtering, but no great web corpus. Google on the other hand have an enormous corpus, but a relatively poor collorative filtering technique. Just perhaps they've realised the value of metadata and nicely marked up data...
Dave Barry Official Website
Let's say you're flipping through your 8,479 cable channels, and you come across a program called Eat Bugs For Money, wherein they bring out a large live insect, and the contestants secretly write down the minimum amount of money they would have to be given to eat it, and whichever one has the lowest bid has to actually do it. Admit it: YOU would watch this program. In fact, right now you're saying to yourself, "Hey, I wonder what channel that's on." Unfortunately, at present it's still in the conceptual stage. It's based on an idea from my editor, Gene Weingarten, who has publicly stated that he would eat a live adult South Florida cockroach (average weight: 11 pounds) for $20,000.



My point is that you'd watch this program, but you wouldn't tell Arbitron. You'd claim that you watched a National Geographic special with a name like The Amazing World of Beets.
Dave Barry's Blog
HOMELAND SECURITY UPDATE



We are in a Heightened State of Alert. Our official national-security status has been raised to Level IX, or "Buttpucker." Everybody needs to be ALERT and HIGHLY SUSPICIOUS. Like, if somebody at the supermarket asks you, "Paper of plastic?", your correct response is: "Who wants to know?"






Dave Barry on homeland security.

Saturday, February 15

z2003-02-14- West Wing Interventionism (WebSeitzWiki)
"We're for freedom of speech everywhere. We're for freedom to worship everywhere. We're for freedom to learn, for everybody. And because in our time, you can build a bomb in your country and bring it to my country, what goes on in your country is very much my business. And so we are for freedom from tyranny, everywhere, whether in the guise of political oppression, Toby, or economic slavery, Josh, or religious fanaticism, C.J. That most fundamental idea cannot be met with merely our support. It has to be met with our strength. Diplomatically, economically, materially..... No country has ever had a doctrine of intervention when only humanitarian interests were at stake. That streak's gonna end Sunday at noon (at Bartlet's inauguration speech).
Google Search:
If you have Office 97 running "fast find", it is probably indexing your hard drive. Also your anti virus protection could be running in the back ground. Try the alt tab delete buttons and see what is running. Mike
SLA members sent to prison / Ex-radicals sentenced for murder
More than a quarter-century after their crime, the former radicals have become the people they vowed to destroy.

Friday, February 14

vog blog::vlog
qualitative methods in various disciplines. one of those scary, erudite, detailed journals that, well, is about qualitative research methodologies... for some reason i'm not surprised that it is in german and english.
Sizzling HTML Jalfrezi - HTML by Example
TP General - Troubleshooting hard disk drive issues
# PC Doctor diagnostics must be completed and any error codes or messages noted prior to hard disk drive (HDD) replacement.

# Noisy drives are not always defective. Some are just inherently noisy. Compare against another identical drive.
Wired News: Conversation With Marc Andreessen Andreessen: We always figured there'd be a much more sophisticated way of navigating, but no one ever came up with it.

Things like the Back and forward button, we never intended that to be a permanent part of the interface. But people get locked into metaphors. You have to be careful with the metaphors you put in front of people because once they click onto one, that's it.

WN: If you were to design Mosaic again, what would you do differently?

Andreessen: If I had to do it over again, I'd probably show some sort of graphical representation of a tree, so you could see what path you're traveling on and could backtrack. I'd also include thumbnail renderings on the tree to show where you'd been.
TIA Systems
The Memory Hole > Information Awareness Office Website Deletes Staff Biographies

Thursday, February 13

CNN.com - 'Hi-tech' shuttle pic really low-tech - Feb. 12, 2003
The shadowy, closely analyzed photo of space shuttle Columbia's underside was not snapped with cutting-edge military equipment, but by three researchers playing around with an old computer and a home telescope in their free time, officials said Wednesday.



The grainy photo was made February 1 at the Starfire Optical Range at Kirtland Air Force Base and released Friday by NASA. It shows what appears to be a suspicious bulge on the shuttle's wing shortly before it broke apart.



But contrary to reports last week, the photo was not snapped by one of Starfire's extraordinarily powerful telescopes, which are designed to spy on enemy satellites and detect incoming missiles.



Instead, it was taken by Starfire Optical Range engineers who, in their free time, had rigged up a device using a commercially available 31/2-inch telescope and an 11-year-old Macintosh computer, the researchers said.



"We were not asked by NASA to do this," said Robert Fugate, the optical range's technical director. "There was no official project or tasking to do this. The people who work here are geeks. This was an opportunity to look at a rapidly moving object and try to take a picture of it. That's really all it was."
O'Reilly Network: Top Ten Mac OS X Tips for Unix Geeks [Oct. 22, 2002]
The quick way to add a user or a group is to feed a record in either the passwd or the group format into niload (commands you type are shown in bold; the ? is used by the here-document syntax that starts with <




% sudo niload passwd . <
? rothman:*:701:20::0:0:Ernest Rothman:/Users/rothman:/bin/tcsh

? EOF
OSXFAQ - Technical News and Support for Mac OS X
Users, Groups, and Permissions form the foundation of Unix's multi-user view of the file system. Users and groups identify you, the files that you own, and the files that you share. Permissions mark out your personal 'turf' and the extent of your access to remainder of the file system - that is the files you can see and change, and the programs that you can run. Permissions are applied individually to each file and define who can read, write, and execute it.



Wednesday, February 12

Social networks sturdier than 'Net TRN 021203
Although many types of networks, including biological networks, social networks, and the Internet, have a lot in common, when you get right down to who is connecting to whom, social networks follow different rules.

Tuesday, February 11

Student loans suck. What more needs to be said? | Metafilter
What I *really* wish is that we hadn't gotten to the point where having a bachelor's degree is seen as essential to having any shot at dignified, interesting work and a comfortable life. I value education, but conflating college with "line up and pay your dues for a ticket on the gravy train" is just screwy, and causes no end of hassle for students who are bright and ambitious but not at all academically inclined.
http://www.qsrinternational.com/freedemos/freedemos.html
Yahoo! Autos : VolkswagenGolf Messages : 354-383 of 383
Motherboards.org - Motherboard Drivers - MS-6373
amazon activity theory selections
296 page
Suchman, Lucy and Randall Trigg, "Artificial Intelligence as Craftwork" in Understanding Practice: Perspectives on activity and context", Chaiklin S. and Lave J. (eds.), Cambridge University Press, NY 1993.
296 page
Ch 4 - Nardi - Studying Context: a comparison of activity theory, situated action models, and distributed cognition
296 page
Highly recommended: American Anthropological Association and Computing Research Association, Culture, Society, and Advanced Information Technology, 1995. http://www.cra.org/Policy/reports/aspects/
Suchman, Lucy. (1999) - "Embodies Practices of Engineering Work".
Activity Theory's central premise (Cole and Engestrom 1993) is that to grasp an activity fully one needs to understand how cultural-historically situated artifacts both mediate activity and are in turn enlivened in and through it. (Structuration theory argument?)
Suchman, Lucy. (1999) - "Embodies Practices of Engineering Work".
Bodker (1996) has proposed an analysis of the use of computer applications in terms of the relation of an application to its object:

The object of activity is present only in the application.

The object exists as a physical object but is present in the use activity as the rendition provided by the computer application. (e.g. Andrea's object of activity-earth)

The object is physically co-present outside the application.
Suchman, Lucy. (1999) - "Embodies Practices of Engineering Work".
The main purpose of the paper is to consider the respective orientations of ethnomethodology and activity theory to work and its objects, with reference to a particular case of working practice. The focus of this paper is on that aspect of engineering work that comprises the production of exhibits and plans, and the place of computer-aided design tools and paper-based drawings as mediators of that form of engineering practice.

Monday, February 10

UCB Parents Recommendations: Vans & Minivans
From: Toby



We have a 1995 Mercury Villager that we bought used this past February with 19,000 miles on it for $17,000.00. Before we bought the van I went to the library and looked at the auto magazines that compare and value cars. This was essential. I would suggest that you do this before you go shopping. Many of the vans are basically made by one company, but sold as 2 different vans, like the Villager, which is the same car as the Quest made by Nissan and the Honda van is the same as another lesser cost van (I don't remember which one). Also, we used an auto broker that we found through Cal State 9 credit union. If you don't like haggling over price, an auto broker is the way to go. After you read about what's available, go test drive and decide which colors and features you want, but don't buy the van until you call the auto broker. The broker will locate the van you want and give you a price. This price will be lower than the sticker price and lower than any price quoted to you by a dealer. You cannot haggle over this price, but you may be able to get a lower price from the dealer. I much prefer buying cars this way. I hate dealing with car sales people. Good luck.
[iBistro] BYU Online Catalog
Personal Author Suchman, Lucille Alice.
Title Plans and situated actions : the problem of human-machine communication / Lucy A. Suchman.
Publication info Cambridge ; New York : Cambridge University Press, 1987.
Physical description xii, 203 p. ; 22 cm.
General Note Includes indexes.
Bibliography note Bibliography: p. 190-197.
Subject term Man-machine systems.
Subject term Cognition and culture.
Subject term Ethnophilosophy.
LCCN 87008013
ISBN 0521331374
ISBN 0521337399 (pbk.)
Allowing controlled SMTP relaying in Sendmail 8.9 and later
FEATURE(relay_entire_domain)
Google Search:
This may not be related, but on ONE install (I've been through a couple of clean installs due to disk problems), I found that in the course of moving and reinstalling stuff, the system forgot that I was an administrator. Really annoying, and I hated the idea of starting all over. So I did some investigation and hacked my way back in. The easiest way I could think of to recover was to set a root password from the install CD, then use NetInfo (with the root password to allow access, which worked even though the root account hadn't actually been enabled for login... though I ended up doing that, too) to add my account back into the 'admin' group. (From which it had been removed.)

Sunday, February 9

Saturday, February 8

Allowing controlled SMTP relaying in Sendmail 8.9 and later
SMTP AUTH in sendmail 8.10-8.12
Introduction

sendmail 8.10-8.12 support SMTP AUTH as defined in RFC 2554 which is based on SASL. This document describes the necessary steps for installation and operation of this feature with sendmail 8.10 and later versions.



(2000-03-23) If you use sendmail 8.10.0 as client for SMTP AUTH, please read the security warning.
Mattel camera linux drivers
The Tard Blog
I can't believe what I see: Tyler is snorting Pixie Stick sugar.

Friday, February 7

using rsync with Mac OS X
using rsync with Mac OS X

Terrence Geernaert tgeernaert@merlinsoftech.com

Tue, 5 Feb 2002 11:16:19 -0800



* Previous message: rsync fails all of a sudden

* Next message: Error from rsync-2.5.2

* Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]



--Apple-Mail-1-269641553

Content-Transfer-Encoding: quoted-printable

Content-Type: text/plain;

charset=ISO-8859-1;

format=flowed



OK, I'm brand new to this group, brand new to rsync, brand new to=20

unix in general. I'm trying to play catch up with this discussion=20

so there are likely many misconceptions that I have about these=20

issues.



Barnes & Noble.com - The Pencil: A History of Design and Circumstance
In this age of the computer, Petroski's delightful, elegant history of the lowly pencil is a mind-sharpener, a revelation. The pencil's slow evolution from metallic-lead stylus paralleled the growth of engineering prior to the Industrial Revolution. In America, the saga of pencil-making encompassed gentlemanly cabinetmaker Ebenezer Wood and philosopher/amateur engineer Henry David Thoreau; the latter, while working in his father's pencil business, hit upon the idea of combining graphite and clay. In modern times, pencil-making was transformed from cottage industry to mechanized science, with a boost from international trade rivalries, the Faber manufacturing family of Germany and engineers' quests for perfection. Toulouse-Lautrec said, ``I am a pencil.'' John Steinbeck was seemingly obsessed with his pencils' points, shapes and sizes. Petroski ( To Engineer Is Human ) illuminates the intersection of engineering, history, economics and culture. Illustrated. (Jan.)
Barnes & Noble.com - The Pencil: A History of Design and Circumstance
Procrastination, How to Stop Procrastinating - Psychological Self-Help
Procrastination is a strange phenomenon. Its purpose seems to be to make our life more pleasant but instead it almost always adds stress, disorganization, and frequently failure. Ellis and Knaus (1977) and Burka and Yuen (1983) describe the process: (1) You want to achieve some outcome, usually something you and others value and respect--"I've got to start." (2) You delay, briefly thinking of real and imagined advantages of starting to change later--"I'll do it tomorrow when I don't have much to do." (3) You delay more, becoming self-critical--"I should have started sooner"--and/or self-excusing--"I really couldn't have left the party early last night, my best friends were there." You may hide or pretend to be busy; you may even lie about having other obligations. (4) You delay still more, until finally the task has to be done, usually hastily--"Just get it done any old way"--or you just don't have time--"I can't do this!" (5) You berate yourself--"There is something wrong with me"--and swear never to procrastinate again and/or you discount the importance of the task--"It doesn't matter." (6) You repeat the process almost immediately on other important tasks, as if it were an addiction or compulsion.
POP before SMTP for Sendmail
How to restrict relaying through your mailserver to only local users that have authenticated using Post Office Protocol.

Relaying Denied/Allowed (in sendmail 8.8/8.9-8.12)
Relaying Allowed

There are a few cases in which relaying is allowed even though it isn't intended. The most common is case is the use of FEATURE(relay_entire_domain) which allows relaying for every system in class m. If class m is wrong, then the system may open up relaying for other hosts in that domain. Check it with



echo '$=m' | sendmail -bt -d0.4
Relaying Denied/Allowed (in sendmail 8.8/8.9-8.12)
O'Reilly Network: Configuring sendmail on Jaguar [Sep. 10, 2002]
Allowing Relaying from Certain Hosts



Sendmail doesn't like to relay mail that isn't sent from trusted sources. The designers of sendmail do this purposefully to try to alleviate the problem of spam. You see, spammers take advantage of mail servers that will relay mail from anyone in order to send mail to all of us while taking advantage of somebody else's bandwidth costs. It's truly heinous.



By default, sendmail's paranoia means that when we set up a server, we can only relay mail through it that originates on the local machine. In order to use it as a proper mail server, we need to let it know what hosts to trust to relay mail. For example, my mail sever is configured to accept email that comes from my private home network that is running behind a NAT with a fixed IP address. In addition, I always want to be able to send mail, using my laptop, from my friends houses which have known DSL hostnames. To do this, you simply need to define these rules in the /etc/mail/access file, as shown:
Using check_* in sendmail 8.8
Using check_* in sendmail 8.8
Relay control in sendmail 8.8,9 for roaming users
Authorize relaying based on authentification provided by a modified POP daemon
FEATUREs for check_* in sendmail 8.9
FEATURE(relay_entire_domain) allow relaying for every system in class m, which may cause a problem if it is set incorrectly.
Relaying Denied/Allowed (in sendmail 8.8/8.9-8.12)
Relaying Denied/Allowed (in sendmail 8.8/8.9-8.12)
William Gibson




Gibson's response to the Columbia tragedy.

Thursday, February 6

POP before SMTP for Sendmail
POP before SMTP

How to restrict relaying through your mailserver to only local users that have authenticated using Post Office Protocol.

Geek Times - Mac OS X: Using Qualcomm qpopper to provide Post Office Protocol (POP) access for email users
Mac OS X: Using Qualcomm qpopper to provide Post Office Protocol (POP) access for email users
Qpopper Information
What is Qpopper?

Qpopper is the most widely-used server for the POP3 protocol (this allows users to access their mail using any POP3 client). Qpopper supports the latest standards, and includes a large number of optional features. Qpopper is normally used with standard UNIX mail transfer and delivery agents such as sendmail or smail.
O'Reilly Network: Configuring sendmail on Jaguar
Setting Up the LUSER_RELAY

Wednesday, February 5

244746 - Disk Defragmenter Polling Causes Excess Disk I/O on Drives with Unformatted Partitions
NOTE: Although the Disk Defragmenter console makes this excess disk I/O apparent by polling every few seconds, the same excess disk I/O can be triggered when you are performing other tasks (such as starting Windows Explorer) if you have a large number of unformatted partitions.
Windows 2000: Hard drive thrashing under Windows 2000
Depending on what is running.



1) win2k uses page files for all sorts of stuff.



Indexing may be turned on.

Are any MS Office products installed.



They also have indexing and other stuff.



Check for viruses also :



Here is my suggestion :



Cleanup the startup stuff. In win98 - Do a Start - Run - msconfig, startup Tab , or for win95 , NT or win2k,

Download the Startup COP a free pcmag utility from

http://www.zdnet.com/pcmag/pctech/content/18/08/ut1808.001.html

Run it and it will show you everything that is listed in all the possible startup

places, and allow you to disable things one at a time until the problem is eliminated.

A lot of probelms are caused by excess old baggage - programs that have not been properly un-installed. Startup Cop will help eliminate leftovers and un-wanted programs that you no longer want.

Older Antivirus programs and Norton Utilities have been known to cause problems

try disabling them also !
Google Search: sendmail mx loop
Did you add "avalys.com" to class w? It seems that sendmail doesn't think the mail domain avalys.com is local, hence it looks for an MX record to find the destination host, and is surprised that the MX record points back to itself. To see the contents of class w run sendmail in test mode: [shell prompt]% /usr/lib/sendmail -bt > $=w This should list all names sendmail considers local. Joachim
'World's smartest person' at U-M
He received the title by scoring 22 points out of 25 possible on the society's online Test for Exceptional Intelligence. It was the highest score ever recorded on the exam.
AppleCare Document: 107288
Mac OS X



1. Open Disk Copy (/Applications/Utilities/).

2. Drag the disk image file icon into the Disk Copy window.





If the disk image file still does not open, users of Mac OS X 10.2 or later (Note 1) may follow these additional steps:



1. Open Disk Utility (/Appliations/Utilities/).

2. Select the Mac OS X startup disk in the left-hand column.

3. Click the First Aid tab.

4. Click Repair Disk Permissions.





After repairing permissions, try opening the disk image file again.
Crash logs in OS X
Mac OS X Hints - Instructions for enabling sendmail in 10.2
This might be common knowledge already, but I've been able to get sendmail working on two different machines by following the instructions in /etc/mail/README. The catch is getting sendmail to start when starting the machine up. I just changed "MAILSERVER=-NO-" to "MAILSERVER=-YES-" in /etc/hostconfig, and now sendmail works again.

She states that "one type of research is not necesarily better than another," but out of approximately 910 lines of her text she devotes only 30 lines to scholarly inquiry and practitioner inquiry and over 870 lines to qualitative and quantitative methods. She lists the characteristics of productive research as "credibility," "transferability," "dependability," and "confirmability," and I think she and most of her readers would agree that, based upon that criteria, empirical methods succeed much more than scholarly or practitioner inquiry.

The purpose of methodological clarity and consistency in a discipline is, as she says, to "let one know how much a given piece of research can be relied on." To return to computers and writing, then, the boundary between a "critical" and an "uncritical" enthusiasm is drawn by a presumed universally agreed upon set of criteria for what claims "can be relied on." Underlying all these calls for a greater methodological consistency in research is an implicit or explicit desire to support computers or writing or rhetoric and composition as a clearly defined academic discipline with a discipline's usual political stability and clout.

like Ronald Sudol and the Delaware study, they don't like the apparent chaos or open flow of what happens in Interchange, what Shoshanna Zuboff calls the "post-hierarachical relationships" implicit in networked communications. To them, hierarchy means controlled, incremental progress. Interchange seems to suggest that the students are always just about to break out of the hold and take over the ship. Consider some of the comments:

* I have a bunch of smart-ass sophomores in my class, and they love to screw around.

* Because the discussion moves so quickly, students are forced to write in one to two sentence comments that allow them only to make fragmented contributions to the overall discussions. These comments do not allow them to make supported arguments; rather, they just make generalized claim after claim.

* Of course, other students respond, and we soon have a meaningless name-calling exercise with insightful comments like "liberals suck" or "Do you consider yourself a FemiNazi?" or "You're just a bigoted male pig." I've even seem some veiled comments bordering on racial slurs pitched in. Some teachers might rationalize this activity as a great learning experience about "bigotry" or ineffective rhetoric. At a minimum, I think it's a waste of time. In a larger sense, it could be seen as threatening to some people, because they cannot confront or even just identify the people who hold ill will toward them.
Regarding the use of computers in composition, one of the more persistent calls put forth in articles in College English, CCC, Computers and Composition, and on BITNET lists like MBU and WPA, and in conference presentations, workshops -- both local and national -- and even in casual conversations in elevators and hallways, is a call for proof.

Proof.

People want proof about the following:

* Proof that people write better on computers.
* Proof that peer work and group work succeed better than drill and practice.
* Proof that classroom and interclass e-mail isn't a trivial use of instructional time.
* Proof that computer network interaction is more egalitarian and less racist and sexist than face-to-face interaction
* Proof that any new idea actually works, is actually better than what teachers are currently doing in their classrooms, no matter what that may be.
Yahoo! News - Tips for Healthy Sleep
_Set a regular time for bed each night and stick to it.



_Establish a relaxing bedtime routine, such as a warm bath or reading a book.



_Make after-dinner playtime a relaxing time.



_Avoid eating a big meal close to bedtime.



_Make sure the bedroom is dark.



_Set the bedroom temperature at a comfortable level.



Tuesday, February 4

What Should I Do With My Life?
Perhaps my favorite "evidence" story is from Bronson himself where he speaks of a job that required him to check data in a spreadsheet all day and put little checkboxes next to the ones he validated. What he actually did was run a small greeting card business out of the office, using all of the office supplies he could lay hands on, and at the end of the day would just go ahead and check off some numbers that he never really validated. His coworkers not only knew about it, but they invested in his business. Being in a dead end office job where no one looks over my shoulder, married to a woman who once told me that if she couldn't do physical therapy she'd like to open up a greeting card store, I found that story brilliant.
What Should I Do With My Life?
He told me, instead of doing something you enjoy, do something that pays decent and works decent hours, and pursue your hobbies. So I do. And now I've got weekends free and enough money to write short stories, scuba dive, and contribute to Open Source projects.



So maybe my job isn't the greatest in the world. I have to deal with crappy management, stupid projects, etc etc. But that's not my life focus. I spend every evening and all weekend doing exactly what I want to do.
So Sorry!!!
7) Take care of your health & well-being. This means both your physical & mental health. You cannot afford to become ill or depressed. Take in enough daily water (body weight/2 = # ounces needed), eat well (protein, vitamins, minerals), invest in some supplements, exercise (1/2 hour walk daily can have an amazing impact on reducing stress), use your support system (family, friends, fellow graduate students), regularly see appropriate health professionals (doctor, dentist, counselor - if need be), take time off from work for recreation (rent videos, chat with friends, whatever floats your boat).
Hey folks: Just got word that Blogger is working on the Invite bug. You may want to try resending your invites and see if it's fixed. Send me one too, so I can check it.
Yahoo! Groups : blogger_user_support Messages : Message 757 of 765
The Pyra staffer who monitors the Pro mailing list just posted the

following:



"I believe this may be a bug we introduced late last week. We will fix

this so invites work again. I'm sorry for the trouble.





best regards,

steve"



----- Original Message -----

From:

To:

Sent: Monday, February 03, 2003 11:53 AM

Subject: [blogger_user_support] Re: problems accepting invitation to join

team





> I've got 22 people creating blogs in a class, and we are experiencing

> the same problem. Disappointing to see that it has been happening

> for a few days now. We are all using IE 5.x

>
A sci-fi weblog dream - megnut.com
It was a pretty scary dream because for part of it I was trying to illegally access someone's archives/top floors and had to climb along the outside of a building for many stories. But there was something wonderfully futuristic about the whole dream as well: weblogs as these physical systems by which we organize our lives, hyper-personalized spam, and the strange parallels between weblogs having the newest content at the top of the page (easiest access) and your "present" being on the ground floor of your blog building (again, easiest access). Or maybe it was only interesting to me, as is the case with 99.99% of dreams written about on weblogs.
ABCNEWS.com : Folk Music Back in Parlors, with High-Tech Twist
"It's great music two blocks from the house," said Kathy Dorman, a historian at the Smithsonian Institution. "I don't drink that much and I hate smoke. And in bars, people are talking and drinking and not paying attention."



And house concerts give musicians badly needed income.



"Folk music isn't all that lucrative. When you're starting out, a lot of places don't pay at all," said Morris, whose top paycheck for a gig has been in the $100 to $200 range.
Memory upgrades from Crucial.com - Upgrade information for the ThinkPad 600 2645-41U
These 144-pin SODIMM modules are compatible with your IBM ThinkPad 600 2645-41U

Monday, February 3

Street Tech :: hardware beyond the hype
The AJMM also records sound -- from voice memos to interviews to full concert bootlegs -- straight to MP3 format. This is accomplished through either the internal mono microphone or an external stereo mic (not included). The AJMM can also record from any digital or analog source, such as a home stereo or an old record player, making it possible to convert your music collection without need for a PC (though that would be a tedious process).
NASA launches anonymous FTP for shuttle debris photo uploads - QuickTopic bulletin board
Interesting - it isn't just "the net" that had to be in place for this to happen. Digital cameras have to be almost ubiquitious - which they are. Now, add to this a basic GPS with timestamped route recording (most of them...) and leave the time/date stamp feature on your camera. When you get back, download the route, correlate against the time stamps from the pictures, and you get time (accurate to seconds) and place (often to 10 metres) automatically. (Some digital cameras can be connected to the GPS to record the time/position info in the metadata for the picture.)

My HP camera lets me add 45 seconds of audio just after the picture is taken - ideal for note-taking.

NOW add the reporting capabilities of the net, and the entire population of the area is, on the whole, better equipped to locate, tag, and report accident-related information than a full survey team of ten years ago - mainly because there are so gosh darn many of them.
Masters thesis on the Influence of the Internet on literature by Terrell Neuage in South Australia Though it is beyond the scope of this thesis one could relate the pattern defining abilities of the brain to adapt, change and as mentioned earlier to link, to the rise of the World Wide Web. Everyday thinking is equivalent to the narrative which will be redefined because of the use of the Internet. The thought processes that we are always encountering within ourselves is one of transferring from node to node. For example as a parent, student, artist, photographer, body builder, astrologer, writer and all the other things one does to be part of society, I may be one moment entertaining thoughts about my children's activities, then jump to thinking about my girl friend, my studies, body building or which time is the correct birth time for Princess Diana (2.15 PM or 7.45 PM?) or any one of a thousand and one things. Society is a linking process, and a society's narrative, to be true, is one of linked nodes.
Google Search:
I have solved this issue on my laptop. Here's what I did on this Win2K machine: ctrl-alt-delete and then brought up the task manager. I selected the processes tab, then I chose "select columns..." under the view menu, and checked "I/O Read" and "I/O Write". I found that there were three processes that were incrementing I/O read/writes every second-- lsass.exe, csrss.exe and ESPMAIN.exe. The first two are windows OS processes that had been mentioned in many of the newsgroup postings, the third looked suspiciously like some scanner software that I don't use any more ("Epson Smart Panel"). I killed the ESPMAIN.exe process and, bingo, problem solved. lsass.exe and csrss.exe still increment, but far less often, and I'm not driven crazy by a once-a-second HD access noise. I looked in my startup folder and sure enough a Epson Smart Panel shortcut was there. Only now it isn't, cuz I deleted it... In my newsgroup searches on this issue I saw a lot of reports of lsass.exe and/or csrss.exe as being the culprits of constant I/O read/writes. In my case, it appears that another process was causing these two Windows processes to read/write to the HD...maybe this is the case for others experiencing this problem as well? hope this has been a help- Ben
A War Crime or an Act of War?
This much about the gassing at Halabja we undoubtedly know: it came about in the course of a battle between Iraqis and Iranians. Iraq used chemical weapons to try to kill Iranians who had seized the town, which is in northern Iraq not far from the Iranian border. The Kurdish civilians who died had the misfortune to be caught up in that exchange. But they were not Iraq's main target.



And the story gets murkier: immediately after the battle the United States Defense Intelligence Agency investigated and produced a classified report, which it circulated within the intelligence community on a need-to-know basis. That study asserted that it was Iranian gas that killed the Kurds, not Iraqi gas.



The agency did find that each side used gas against the other in the battle around Halabja. The condition of the dead Kurds' bodies, however, indicated they had been killed with a blood agent
Google Search:
NASA computes the current probability of losing a shuttle at 1 in 250. Out of that, the largest single risks are mechanical failure during ascent (1 in 500) and micrometeoroid/orbital debris strike (1 in 700), with all other causes combined accounting for the remainder. The next round of SSME upgrades (Block III) will likely reduce the risk of ascent failure below that of micrometeoroids/orbital debris.
Contemporary Lit.
Ftrain: Amiga 1000
The Amiga was my continuity. A year after we brought it home, my parents divorced, but my father bought an Amiga 500 with a full meg of RAM, a powerhouse. I shuttled back and forth between them on Philadelphia's SEPTA buses, with disks of public-domain software in my shirt pocket, sharing data between their worlds, continuing in the exploration despite the fact that the world around me was collapsing.
Ftrain: Getting Close to the Machine
I'd like to think that computers are neutral, a tool like any other, a hammer that can build a house or smash a skull. But there is something in the system itself, in the formal logic of programs and data, that recreates the world in its own image. Like the rock-and-roll culture, it forms an irressistible horizontal country that obliterates the long, slow, old cultures of place and custom, law and social life.
Ftrain: Getting Close to the Machine
When someone 50 years from now asks about the relationship between writing and coding, the answer will be different, I think, than Ullman's, because writing will be seen not only as rendering lines of kerned text into pages of 50 lines which fit into pages divided by golden sections, but will be a fundamental task related to dozens of creative activities, from designing
Ftrain: Getting Close to the Machine
The Bug has several code samples in it, and I found that to write even such short routines, I had to imagine the shape of the whole system they were part of. And, immediately, I slipped right back into the coder's mind-set, hours going by in a kind of ferocious anxious humming. It was hugely pleasurable; it was exhausting. I soon found I was using code to avoid writing - oh, I'll just fiddle with this little section here - and a whole day would go by without my having written a scene or a line of dialogue. So I had to put the code aside.

Sunday, February 2

Shuttle Tile
This tile material protects the shuttle during flight. The plastic box is 2 x 3 inches and the tile is 1/2 inch to 1 inch in size. The size and shape will vary. Shuttle tile is so fragile we recommend your handle it as little as possible. Hard to believe this is what protects the shuttle!
"5 ... 4 ... 3 ... 2 ... 1 ... Goodbye, Columbia" by Gregg Easterbrook
If you get twisted back around toward the Cape,' you blow the fuel tank off and glide home. If the beast is too badly wounded to land, but you can slow it down to a few hundred m.p.h. before you splat into the water, you're okay. At that speed you can eject.



But you're in luck-the launch goes fine. Once you get into space, you check to see if any tiles are damaged. If enough are, you have a choice between Plan A and Plan B. Plan A is hope they can get a rescue shuttle up in time. Plan B is burn up coming back.



But let's not worry about the tiles. The tiles should be okay. They're certainly spending enough time on them. So once you get back into the atmosphere, the mad joyride begins. You have no power now, the engines are spent and switched out. You get .one shot at a landing. Originally the plans called for a couple of regular jet engines to give you enough power to maneuver, or maybe go around for a second approach if the first one doesn't line upright. But jet engines got killed in the cost-cutting. A billion-dollar ship, and this is how they were cutting costs ....
Lists hosted at LISTS.LDS.ORG
Guardian Unlimited | Special reports | Nasa chiefs 'repeatedly ignored' safety warnings
Fears of a catastrophic shuttle accident were raised last summer with the White House by a former Nasa engineer who pleaded for a presidential order to halt all further shuttle flights until safety issues had been addressed.



In a letter to the White House, Don Nelson, who served with Nasa for 36 years until he retired in 1999, wrote to President George W. Bush warning that his 'intervention' was necessary to 'prevent another catastrophic space shuttle accident'.



During his last 11 years at Nasa, Nelson served as a mission operations evaluator for proposed advanced space transportation projects. He was on the initial design team for the space shuttle. He participated in every shuttle upgrade until his retirement.



Listing a series of mishaps with shuttle missions since 1999, Nelson warned in his letter that Nasa management and the Aerospace Safety Advisory Panel have failed to respond to the growing warning signs of another shuttle accident. Since 1999 the vehicle had experienced a number of potentially disastrous problems:
Scripting News
Andrew Juby: "My roommate has access to Goddard Space Flight Center's Orbital Information group server. He can pull up data on just about any non-classified orbiting object. We checked it this morning and pulled up some data on Columbia, and ran it by the aerospace major across the hall. It appears that at about 2 or 3AM, as Columbia was into its descent, it pulled up."
Install BlogThis
In the beginning there was BlogThis, and it was good, and right-click BlogThis for Internet Explorer on Windows, and it was great. Then came Internet Explorer 6, seemingly designed to break as many little things as possible, in the most incomprehensible way possible. Right-click BlogThis was one of the broken things, producing a "permission denied" error anywhere except on blogger.com pages. Until Marcus figured out the problem, anybody using IE6 was out of luck.
Houston we have a problem! | Metafilter
I know how to never have another Challenger. I know how to never have another leak, and never to screw up another mirror, and that is to stop and build some shopping centers in the desert. - J. R. Thompson, NASA deputy administrator

Saturday, February 1