Forgot your password?
typodupeerror
Medicine

Journal: Gimme Gimme Penicillin!

Journal by Jeremiah Cornelius

China 'seals off' town after man dies of bubonic plague
"A Chinese town has been sealed off and 151 people placed in quarantine since last week after a man died of bubonic plague, state media said Tuesday.

The 30,000 people living in Yumen in the northwestern province of Gansu are not being allowed to leave, and police at roadblocks on its perimeter are telling motorists to find alternative routes, state broadcaster China Central Television (CCTV) said.

Comment: Re:Open Up Borders to Everyone! :-) (Score 1) 96

by jedidiah (#47519559) Attached to: VP Biden Briefs US Governors On H-1B Visas, IT, and Coding

> If we're going to open up our southern border...

The problem with H1-Bs is not that they "feruhners". The problem with H1-Bs is that they are an underclass that's at the mercy of the company that imported them. They are even lower on the totem pole than underpaid undocumented Mexicans.

If you are an H1-B, ICE knows exactly where to find you if you get too "uppity".

Comment: Re:IANAPP (I am not a particle physicist (Score 1) 174

by jfengel (#47519071) Attached to: China Plans Particle Colliders That Would Dwarf CERN's LHC

One pathway for electron/positron collision can produce a neutral Z and a Higgs. In fact, they already tried that at the Large Electron Positron collider, the predecessor to the LHC. It came very close, at 115 GeV. There were hints of the Higgs, and so it came as no real surprise to find it just 10% higher.

This is actually a more efficient way of producing Higgs particles, at lower energies. The LHC produces the Higgs with two quarks, but there are six quarks involved in the proton/proton collision, so a lot of the energy you put in doesn't produce Higgs bosons. (In very rare instances you'll get two Higgs bosons, but most of the time the other quarks just produce other stuff.)

Comment: Re:And BD-Java is good how exactly? (Score 1) 92

by jedidiah (#47518795) Attached to: Open-Source Blu-Ray Library Now Supports BD-J Java

> But then I have to do that for every single disc. And I value my time.

What time? You stick the disk in and type run.

There is no "time" involved. The computer does all of the work. It chugs along quietly while you go do something else.

The part of the process that requires my direct interaction with the computer actually takes LESS time than futzing with a console player would.

There's no need to "pretend' that disk menus are useless. They serve no real purpose for 99.9% of users. If anything, they are a bother.

The Internet

Journal: Was the Internet Created for Covert Domestic Surveillance?

Journal by Jeremiah Cornelius

"From its creation by DoD contracts and grants to research institutions, there have been aspersions cast by those easily dismissed as "fringe" commentators, on the nefarious, or at least covert, motivation to create the Internet. Conspiracy theory may have been met by reality in recent months with now commonplace reporting, first by Wikileaks and later, in the more extensive

+ - Was the Internet Originally Created for Covert Domestic Surveillance?

Submitted by Jeremiah Cornelius
Jeremiah Cornelius (137) writes "From its creation by DoD contracts and grants to research institutions, there have been aspersions cast by those easily dismissed as "fringe" commentators, on the nefarious, or at least covert, motivation to create the Internet. Conspiracy theory may have been met by reality in recent months with now commonplace reporting, first by Wikileaks and later, in the more extensive Edward Snowden revelations. It is still almost canon, that NSA mass-surveillance and warrantless information analysis occurred through coopting the burgeoning Internet, and diverting traffic in a way that is counter to the ideals of its creators and promoters. But what if the social, commercial Internet were always intended as a sort of giant honeypot? The idea would still seem farfetched, if it weren't recently disclosed by William Binney that the NSA is recording 80% of all US phone conversations — not simply metadata. Closer examination of the record shows that ARPAnet was being used to clandestinely gather information on the legitimate activities of US citizens — and transmit the information to the US Army Intelligence Command NSA — as far back as 1968! According to articles published in 1975 by MIT in "The Tech":


"via the ARPANET, a computer network connecting more than 50 government agencies and universities throughout the country. The network is funded by the Department of Defense Advanced Research Projects Agency (ARPA)... The information, according to intelligence sources, was transferred and stored at the headquarters of the National Security Agency (NSA), at Fort Meade, Maryland. The Army files were transmitted on the ARPANET in about January 1972, sources say, more than two years after the material — and the data banks maintained at the [Army's] Fort Holabird facility — were ordered destroyed."


MIT officials were worried 40 years ago, about this abuse of interconnected TCP communications and the complicity of their own research scientists. These concerns arose at the height of the Watergate fallout and downfall of President Nixon for illegal wiretapping and information theft allegations. The danger of Government "record keeping" was outlined by Senator Sam Ervin, in an address to MIT that was also profiled in the same publication. Clearly, this did not begin in the last decade, and clearly pre-dates the 2001 "Global War on Terror" pretext. It is important to remember, the NSA was an almost unknown agency at this time, and was chartered to strictly forbid intel on US citizens and those dwelling within US borders."

Opportunities are usually disguised as hard work, so most people don't recognize them.

Working...