Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
User Journal

Journal Journal: Slashdot comment thread life expectancy 15

I've noticed a trend lately (like in the last couple years). Comment thread lifespans are becoming shorter and shorter. I'm usually good about going back to my messages, and keeping up conversations in the thread. It seems not everyone else is.

    If anyone who programs here reads this, do your own research against the database, and see what mean life expectancy of comment threads is. I almost guarantee if you run it against all stories from the beginning, you'll see it's tapering off.
    What I have observed with my comments, even the occasional first post, is that the thread will die off at about 2 to 3 days, regardless of how interesting the conversation is getting. It seems people just aren't interested in going to older stories, which isn't surprising since it's a pain to get to older stories. Look for a story from two weeks ago. Type in some keywords in the search? No way.. Pointy-clicky through the More buttons, good luck there.

    Still, it's easy enough for people to keep up with running conversations. Well, I assume so. When we were forced into the new theme, I had to be sure my messages box was at the top left. Maybe I'm one of the few who actually set up for that, or most people are set for no notifications. Either way, it's becoming disappointing where conversations don't run their course. I don't think it's me... I have week and month long conversation threads going with friends and colleagues, even if every 3rd message (for colleagues at least) is "you are dumb, now send what we asked for". :) No offense to any colleagues or ex-colleagues who may read this. I'll assure you to your face that I'm not talking about you, but sure as hell when you aren't looking, I'm going to point at you and say "it was him".

So back to the topic... I wish more of you would keep up your ends of the conversation. It's hard talking about interesting subjects, and when I've written a well thought out reply, it's just exceeded the MTTL (mean time to live) for a thread, and it's abandon. Well, except for the random troll who goes back through old threads and writes TL;DR, but he barely counts as anything. :)

    Maybe Slashdot can gear up something more conducive to actual conversations, rather than a few hundred drive-by comments that are dead end conversations. I really miss the intellectual (or quasi-intellectual, sometimes) conversations, now replaced by a short thread lifespan and high churn of stories.

User Journal

Journal Journal: GPG signature: first remove whitespace+non-printables 1

I've settled on a hopefully credible way to sign my posts without needing to worry about how word-wrapping will mess up the GPG signature. Before signing my posts, I will remove spaces, tabs, newlines, and any other non-printable characters before signing.

That means that the GPG signature of my posts will be invalid as-is (since the text of the posting itself retains the whitespace and non-printables). That means you will have to remove the whitespace/non-printables yourself before running through the GPG verification to see that it is a valid signature. This is how to do it:

put the plain text into PlainTextFile, and the signature (including beginning and end lines) into SignatureFile, and use this command:
tr -cd [:graph:] <PlainTextFile | gpg --verify SignatureFile -

Don't forget the single hyphen at the end of the line, which has a space before it.

User Journal

Journal Journal: Things I learned today. Browser URL length limitations 2

For a long time, I've followed what I've read regarding URL lengths. 255 characters is it. Never let it get longer than that.

    By the RFC's, 255 characters is the guideline, to maintain backward compatibility with old browsers, old proxy servers, and other miscellaneous hardware that may be in the way.

    I went looking for more information, but found conflicting or outdated information. Who cares what the limits on Netscape 4 or MSIE 5 were.

    In my own personal MythBusters kind of way, I wanted to see what the limitations really are.

    What fun would it be without coding something up to handle it. :) I would share the code, but it seems Slashdot doesn't like that much. Basically, it would generate a URL, something like http://example.com/test.php?pad=11111 , and use a javascript redirect to send it back to itself. On receiving it, it would read the number of characters of the full URL, then add an increment to the pad. It printed the length of the request, and the full URL in the browser, so I could see where it was at. I introduced a 1 second pause so I could read the output.

    Initially my increment was 1, but that takes an awful long time, even with keepalives cranked up. I worked my way up to 500 per exchange, so the test would move along quickly. Watching the server stats, the keepalives were doing their job perfectly. The same connections were reused until their life expectancy ran out.

    I couldn't just give a redirect header. Browsers tend to not like that. My initial test with Firefox showed the problem. The default for network.http.redirection-limit is 20. Even turning that up to 999999 would stop pretty quickly (at about 500, if I remember right)

    My test client machine is a Windows 7 Ultimate machine with a Phenom II x4 955 and 8GB RAM. My test browsers are MSIE 8.0, Chrome 9.0, Firefox 3.6.13, and Safari 5.0.3. During the tests, I did not run into problems with CPU or memory utilization.

    My test server is a Slackware Linux 13.1.0 machine with two dual core Xeon 2.8Ghz CPUs and 4GB RAM. It is using Apache 2.2.17 and PHP 5.3.5. Other than custom configuration options, it's a fairly plain version of Apache and PHP. No patches. The OS is pretty clean. All non-essential ports and tasks are disabled. During the test, I did not run into any CPU or memory utilization problems.

    On the first run I observed:


        MSIE 8.0 4095
        Chrome 9.0 8190
        Firefox 3.6.13 8190
        Opera 11.01 8190
        Safari 5.0.3 8190

    I looked around a little. Apache lets you lower the length of the URL in the config file, but not increase it. The default is 8190, exactly as tested. Time to go patch Apache!

In httpd.h
/** default limit on bytes in Request-Line (Method+URI+HTTP-version) */
#ifndef DEFAULT_LIMIT_REQUEST_LINE
#define DEFAULT_LIMIT_REQUEST_LINE 16777216
#endif /** default limit on bytes in any one header field */
#ifndef DEFAULT_LIMIT_REQUEST_FIELDSIZE
#define DEFAULT_LIMIT_REQUEST_FIELDSIZE 16777216
#endif /** default limit on number of request header fields */
#ifndef DEFAULT_LIMIT_REQUEST_FIELDS
#define DEFAULT_LIMIT_REQUEST_FIELDS 16777216
#endif

    8190 was obviously set by people with no ambition. 16.7 million? That's a real URL! :) And before anyone says it, no, I wouldn't normally make the URL longer than I'm willing to type. Just like the MythBuster folks wouldn't normally put a dead pig in a car to see if it stinks. It's all in the name of science I tell you! :)

    So limits upped to 2^24, recompile complete, and we're ready to test again. While watching the compile, I had to ask myself, "does PHP have a limit too?". I guess not. Here's the results.


        MSIE 8.0 4095
        Chrome 9.0 122560
        Firefox 3.6.13 111060
        Opera 11.01 132560
        Safari 5.0.3 131060

Notes:
    1) I aborted the tests after I got bored.

    2) Chrome stopped displaying the full URL at about 32,000 characters. It truncated it at the ?, but did process correctly. If you have a 32,000 character URL, expect people to not be able to copy it from Chrome very easily. :)

    3) I started all the tests very close to the same time, and aborted them all very close to the same time. I don't normally use anything but Firefox, so I have several utility toolbars (webmastering, packet examination, and SEO analysis) that are installed. The others are clean.

    4) You can't use this as a benchmark saying any browser is faster than another, because I was limited by upload bandwidth at home.

    During the test, I was watching my uplink bandwidth graph. I'm on a residential line. It was clear where the upload bandwidth is cut off at (about 700Kbps). Due to the nature of this test, Every request was sent to the server, and returned to the browser, so like it or not I needed to use the same bandwidth each way. If I have a moment of sheer boredom at work or a datacenter sometime, I may repeat this test on a LAN. It's doubtful though.

    So in conclusion....

    1) All the modern browsers tested, except MSIE are effectively unlimited to the size of the URL they can handle.

    2) MSIE is still limited to a URL length of 4095 characters. I don't see a workaround for this.

    3) Apache is limited by default to 8190 characters, but this can be corrected with a patch.

    4) Regardless of what these components proved they could do, you can still encounter problems with firewalls, content filters, proxy servers, etc. Don't expect to be able to use over 255 characters.

User Journal

Journal Journal: 2012 Presidential Bid 5

I thought this was worthy for cross posting to my journal.

    For the 2012 election, the answer is easy.

        Write in JWSmythe!

        I promise restoration of the rights of all people, as protected by the Constitution and Bill of Rights.

        I promise transparency in our government, and open public audit of all government projects.

        I promise revocation of the Income Tax (25% of your income for most citizens), to be replaced by a 2% sales tax. This effectively gives a 23% raise to all working citizens.

        I promise increase in tariffs on foreign goods to be no less than 2% of the retail value, to encourage growth in the industrial sectors of America.

        I promise immediate closure of all tax "loop holes" to ensure all "big money" corporations pay in their fair share.

        I promise yearly "dividend" payments to the citizens of the United States on any excess tax paid by the citizens and profit from foreign tariffs.

        I promise health care in the form of open access doctors and hospitals to be no less than 25% of the total medical service field (at least 25% of doctors will be free for the citizens). You may still purchase insurance, and doctors may still provide special expert service, but for those who can't afford it, free services are available, and more positions will be available for both new and skilled doctors.

        I promise open borders, reducing the lengthy and confusing immigration/emigration procedures. Diverse and contridactory policies exist now, including Canadians who are welcome across the friendly open borders, but Mexicans who are frequently detained, arrested, or left to die in military style borders and checkpoints. This will reduce operational costs for enforcement agencies by billions yearly.

        I promise retiring the Department of Homeland Security and the Transportation Security Administration, returning their duties to the appropriate intelligence agencies. This removes over $55 billion in yearly government expenses that are simply not necessary.

        And oddly enough, I'm dead serious. I'm not a billionaire, so I cannot afford the campaign. The estimated cost for the 2008 Presidential election was $1.6 billion per candidate. Neither established party back me. I would hurt their corporate interests.

        And yes, I am an American born citizen. I have traveled to the majority of US states, and both bordering nations. I don't know everything, but I know people who I can trust who are experts in their fields. No individual can run the country properly, but a good team will return the United States to it's prior reputation of the nation all others want to emulate, rather than the most powerful and embarrassing nation in the world.

User Journal

Journal Journal: How not to transfer an OS 6

I got a fun pre-xmas present, a new Phenom II X4 955. It's a 3.4Ghz CPU that runs very happily at 4Ghz. The previous occupant in that socket was an Athlon II X4 2.8Ghz, that ran happily for a year at 3Ghz.

    I spent an hour fiddling with overclock settings, and settled at 4.2Ghz (more or less). While sitting with just the browser open, Asus Probe (temp, fan, and voltage monitor) started screaming that the core voltage was above threshold. At about 6pm, there was a thunk, and everything went dark. I'm not sure if it was the power supply or motherboard died. I had ongoing problems with the motherboard since I got it, where bios settings would mysteriously change themselves after weeks of working normally. The power supply wasn't anything spectacular, but it seemed to work. I headed down to CompUSA, and picked up a new power supply, motherboard, and I decided that the drives weren't fast enough, so I picked up a pair of 1.5Tb SATA drives to run as a RAID0. Mmm. More speed.. :)

    I got home at about 8pm. I dismantled the whole thing, and had it reassembled in about 10 minutes. Now I have two blank drives in position (ports 1 & 2), the old drive (port 4), and the DVD player (port 6). I poke around in the BIOS a bit, getting everything set right, and setting the drives as a RAID0. I boot up to a trusty Linux CD to start the transfer. Blah, the RAID controller is really a software raid. I see both disks. There are fixes, I'm just not that far yet. I decide to just copy everything to the first SATA drive, and I'll RAID other parts later. My girlfriend would like to watch a movie with me, as I set up all my theater equipment in our new "theater room" (DLP projector, 8' wide screen, 7 speakers all properly placed and tuned +- 1dB). All I have to do is get the transfer started, and go watch the movie.

    dd if=/dev/sda of=/dev/sdc bs=1024k

    Seems simple enough, right? I switch to another console, and kill -USR1 $pid , to see where it's at. 2GB transfered. Great. The partition table should already be written. fdisk -l /dev/sda shows nothing. hmmm. fdisk -l /dev/sdc shows nothing.

    Aw fuck.

    It dawns on me, I'm not cloning the old drive to the new ones, I'm cloning the empty drive over my data! ABORT ABORT ABORT!

    Well, the partition table is gone, and presumably the beginning of the drive is overwritten, so none of that will be recovered. I think I have enough crap on there to fluff it a bit. My first and second partitions were Linux, which is easily replaced. The third and fourth partition hold Windows 7 and all my current work. The fifth partition holds all my virtual machines, which are my testbed for all kinds of fun things. Employment essential aren't a big deal, they're replicated at work, and on backups there. It's things like the 5,000 pictures that I took over the years, that I reacquired from various sources, which are now almost organized to store and back up, but I haven't finished. And a few videos including a 1hr 15min video of a live band that I'm including 400 stills into to make a good video of their performance.

    With tools on the TRK, I've been able to see the partitions to recover, but since I'm not totally familiar with the particular tool, it's been a slow process. Reading across a 1Tb drive, it takes hours. Even still, I'm not totally sure I could convince Windows to clone to the array, rather than using just one drive.

    So now, I'm starting off with a fresh Windows install. The Windows installer sees the array. I'm using 1Tb for Windows (2 1.5Tb drives RAID0 = 3Tb). Once I have a working machine again, and can play WOW with my girlfriend (she likes playing it), I'll be happier, and then can repair the messed up drive overnight on a few nights.

    The only real problems I had on the old machine were that it couldn't play Stargate: Revolution (crashes after a few minutes), and I wasn't totally satisfied with the drive speed. According to the "Windows Experience Index", my scores were:

Component
Processor 7.3
Memory (RAM) 7.3
Graphics 6.6
Gaming graphics 6.6
Primary hard disk 5.9

(current "max" score is 7.9)

    When I've looked at machines in the stores, this is way above any retail box. I just wanted to get the drive speed in line with the other parts. Dammit. So it'll take a few days to get it up and working properly. Until then, I'll be limping along on the laptop. :) No video editing on the laptop though, it just isn't fast enough, even though it's only a few months old.


Processor 3.2
Memory 4.9
Graphics 3.0
Gaming graphics 4.5
Primary hard disk 5.4

United Kingdom

Journal Journal: Sale of Goods Act beats AppleCare 2

A little while ago, someone on Slashdot pointed me at the Sale of Goods Act in relation to purchased electronics. The act, for those unfamiliar with it, requires that goods be 'suitable for the purpose for which sold.' This is a fairly broad term, but it basically means that they must be able to do anything that the seller claims that they can do. Under this law, you have 6 years from the date of purchase to file a lawsuit if the item does not match the claims.

This was relevant to me because my MacBook Pro is now out of warranty and the battery is dying. Looking in the System Profiler, its full charge capacity was showing up as 1476mAh after 56 charges. When new, it was 5500mAh. These numbers don't mean anything by themselves, but Apple claims that their batteries retain 80% of their full charge capacity after 300 charge cycles. Claiming this means that a battery that does not retain 4400mAh after 300 charge cycles is not suitable for the purpose for which sold, and they are legally required to refund or replace it (irrespective of the time that has elapsed, although I can only sue them if they don't within 6 years of the time of sale).

I called their support line and was put through to an Indian woman, who explained that the warranty had expired. I quoted the relevant parts of law to her, and (after being kept on hold for a bit), was transferred to someone senior. He very quickly agreed to send out a replacement battery.

Interestingly, he did not ask that the original battery be sent out, nor that I provide a credit card number where I would be billed if the battery turned out not to be defective. I've had two batteries replaced in warranty, and this was standard procedure then, so apparently I get better service out of warranty. I don't have a great deal of use for a battery that only lasts about 35 minutes on a full charge, but I'll probably keep it as a spare.

As always, it pays to know the law. It's a shame that Apple, which claims to be a customer-focussed company, doesn't educate its support team about this though. Possibly the Indian call centre deals with people from everywhere English speaking, while the Irish one only deals with people in the UK and Ireland, so the people there are more familiar with British law, but if I had not quoted the relevant act then I would have been charged £99 for a battery, on top of the £1.50 it cost to call their support line for half an hour.

User Journal

Journal Journal: Why The Encryption Back Door Proposals are Bad (Technically) 2

Permission is hereby granted to distribute modified or unmodified copies of this content far and wide. I, the author, do request though do not require that the link to the New York Times story is preserved in any redistribution, however.

(Copyright (c) 2010, Chris Travers)

The New York Times has reported today that the Obama Administration is seeking legislation to require backdoors into encryption software that could be used for wiretapping. I believe this is deeply problematic for both technical and social reasons, but the technical reasons are probably the worst. Because this area is not well covered in the existing articles, I figure it's worth giving a quick primer here.

  Types of Encryption

The simplest form of encryption is what's called symmetric encryption. It comes in various forms, some simpler than others, but the basic process is conceptually simple. Two parties share a secret. One party takes the message and encodes that message with the shared secret, and the other party decodes it using that same shared secret. This encryption is reversible and the key is the same on both sides.

A trivial example might include what we think of as ROT-13 (used for obfuscation) where every letter is rotated 13 places forward. So "this is a sample message" becomes "guvf vf n fnzcyr zrffntr." Of course such a cypher is easily broken, but there are very good quality symmetric cyphers available, such as AES.

The real problem with symmetric cyphers is that they require that both sides knows the same key before encrypted communication begins. If you are communicating with a lot of third parties, you would find you'd either have to publish the key (making sure everyone else could decrypt the same messages!) or find some way of getting the keys to the other parties in advance. This obviously renders this form of encryption useless for initiating secure communications with individuals one has never met.

To solve this problem, public key encryption was designed. Public key encryption uses two keys, called a public key and a private key. Knowledge of the public key is not sufficient to derive the private key through any sort of feasible process, and these keys are usually very long (AES may be 256 or even 512 bits long, but public/private key pairs are often 1024, 2048, or 4096 bits long per key), making brute force even harder (since the public key is expected to be publicly available).

The public key is then published and the private key is retained. A user can then look up a public key, encrypt a message with it, and only the holder of the private key can decrypt it. Similarly a private key holder can sign a cryptographic hash of a message and anyone with the public key can validate this "digital signature." (A cryptographic hash is another form of encryption with is one-way, and is used in document validation, tamper-proofing, and password checking.)

Public key encryption depends on the idea that ONLY the appropriate party has the private key. When you make a secure purchase on, say, Amazon.com, Amazon sends you their public key, and you and them use this to negotiate a symmetric cypher (probably using AES or RC4). In this way you know the key was properly exchanged and eavesdropping on this sale by criminals is not possible. When you enter your credit card data is not intercepted by criminals. Protection of the private key is very, very important to this process, but even knowing the private key does not enable you to eavesdrop on a conversation in process since that's done with a symmetric cypher.

SSL, PGP, IPSec Opportunistic Encryption, and related technologies all use asymmetric encryption, but the differences tend to be in how keys are published and who is vouching for them. SSL is designed so that you know who you are talking to because a third party (like Verisign) is vouching for the identity of the server.

Problems with Backdoors in Public Key Encryption

To effectively wiretap public-key-based communications, you have to have access to the private key, or you have to tap them post-decryption. Tapping post-decryption works fine in some contexts, such as what you are purchasing at Amazon.com. However, it does not properly work when trying to capture the content of encrypted emails, since these are usually encoded with the recipient's private key. Communications encrypted in this way are not generally vulnerable to interception in the middle. Moreover, communication itself could include encrypted files as attachments and such which could be handled entirely outside the flow of the program (I can encrypt a file and then attach it and my email program doesn't care if it is encrypted).

There isn't a real way to retrofit peer to peer communications programs to allow this sort of interception without compromising the core of how encryption works. A company may maintain their own certificate authority and use it to publish keys for internal company communications. A person taking a company laptop home may then use those certificates to encrypt emails. There is no way to intercept the content of these communications without requiring that the company keep copies of all private keys, thus compromising their own security. Similarly, if I email out an OpenPGP key or an OpenSSH key, these are not sufficient to wiretap the communications that would be encrypted using those keys. The only way out would be to require the makers of the software to include a facility sending the private key to some sort of escrow service which could then provide the key to law enforcement, but this compromises the basic integrity of the software, and any attempt on open source programs could be easily circumvented.

Consequently, this doesn't actually affect the sorts of technologies an organized crime ring is likely to use. Instead it makes each of us more vulnerable to government spying, and it makes key data, such as credit card data, far more accessible to criminals.

Such a law would thus benefit organized crime at the expense of the average consumer. It's an unbelievably bad idea no matter how you look at it.

User Journal

Journal Journal: Misinformation Abounds regarding Vaccines and California Whooping Cough Epidemic 2

I have had a great laugh doing some research online (various sites) to try to figure out why this year's whooping cough epidemic is happening in California. It is amazing the amount of misinformation I have found. Pro-vaccine people are blaming it on anti-vaccine people (false, see below), and Anti-vaccine people are blaming it on the vaccine (also wrong). Some people are even blaming it on illegal immigration. As best as I can tell this is because the whooping cough vaccine is different from the vaccines of, say, Polio or Measles, and people try desperately hard to fit it into their agenda even when it doesn't fit. In my reading I have learned a lot about a type of vaccines I never really paid attention to. I figure it's time to set everyone straight.

The NPR article above is particularly laughable (really, NPR does enough good reporting they should know better) because they say whooping cough was once "wiped out." Not so, says the CDC.

Most vaccines against serious illnesses are called "live attenuated virus" vaccines. These include MMR and Polio, and and basically the idea is you give the body a weak version of the virus so it develops an immune response against a stronger version. Usually with appropriate doses, these provide permanent immunity, but there are rare cases where the virus can revert, so it is possible to get full-blown measles from the MMR vaccine, though once again this is rare. These are the vaccines which produce herd immunity.

It turns out that whooping cough vaccine is a different kind of vaccine altogether and in fact individuals are not actually vaccinated against the bacteria that cause the disease at all. Instead, the vaccine is against a toxin that is excreted by the bacteria, and that toxin, called an exotoxin, is what causes respiratory damage. The theory is that this way if you get the illness, your body will have a head start at damage control (by attacking and neutralizing the exotoxin) and so you won't get very sick. So the vaccine is a dose of denatured bacterial exotoxins, called toxoids, that your body can develop antibodies to. Other toxoid vaccines include tetanus and diphtheria. While it is possible to be allergic to an acellular toxoid vaccine like this one, it is entirely impossible to get the disease from it because there are no live (or even dead) microbes in the vaccine itself. Whooping cough, or pertussis, vaccine is usually given with diphtheria and tetanus toxoid vaccines together either as a DTaP or a Tdap depending on age of the individual, but adult vaccinations are rare.

One interesting feature about toxoid vaccines is that they don't actually provide direct immunity against the disease at all because the targets of antibody production aren't on the envelope of the microbe. Instead they work by reducing the severity (and length) of the illness. In short, they don't keep you from getting sick. They just keep you from getting extremely sick. Consequently most people reading this could still get diphtheria this winter, or whooping cough, and could even spread it, but you probably wouldn't know you were carrying a serious illness. In short these vaccines provide absolutely no herd immunity at all, though they may provide some epidemiological benefits in terms of reducing the number of individuals infected by a single person (the downside of course is that it makes diagnosis and monitoring much harder--- we simply don't have any idea, for example, how many minor cases of whooping cough or diphtheria actually occur every year. We just know they don't get sick enough to be diagnosed).

Yet the news media and many "experts" still talk about herd immunity from this vaccine. Indeed while the CDC recommends adults be vaccinated, they state clearly that herd immunity is not a direct factor and that it's not a simple choice.

And while it is not believed that whooping cough has an asymptomatic carrier state, diphtheria is shown to have one, particularly in vaccinated adults. (One possibility worth considering is that asymptomatic means just that, so even mild symptoms, such as those resembling the common cold could be a symptomatic carrier state.)

So the picture that emerges is that whooping cough vaccine prevents death and long, tiring illnesses in children, but doesn't stop the bug from circulating. So it's probably a good thing for kids to have. However, whooping cough is also very much out of control and not just this year, as the CDC admits.

Furthermore I have come to realize that a few times in the last decade I've gotten this cough which lasts a few weeks and then mostly goes away, except for periodic, very heavy coughing, and with no symptoms in between. In these cases, sometimes I have been diagnosed with asthma but the inhalers don't seem to help much (so I go back to using an herbal remedy which seems to work very well, but it is rather non-standard). This lasts a few more months, and then goes away. My current thinking is that my son probably picked up whooping cough at school and I picked it up from him. Since he was vaccinated, he only seemed to have the common cold, but I got something a bit worse.

This specific vaccine isn't about herd immunity, but rather reducing the severity of a serious childhood illness. It doesn't contain microbes, live or otherwise, and while it may reduce the spread of the illness there isn't sufficient data to know the extent of this. This particular vaccine is almost certainly worth giving to most kids. However, there is no benefit that non-vaccinated individuals get from those who are vaccinated in this case.

Whooping cough cycles come and go every few years. This is no different. While hospitalizations may be preventable with the vaccine, it's spread is probably not.

Earth

Journal Journal: Oil Munching Microbes 1

Researchers have discovered a new microbe that is eating the gulf oil spill fairly readily, with the added bonus of not depleting the dissolved oxygen supply too much. (abstract only, article is paywalled)

Certainly a piece of good news out of that mess.

Here's an odd thought I had some years ago..what would happen if these sorts of bacteria got established deep down in the big pools of oil? As in, one day we find out we are a few months away from no oil because it is being eaten up....wouldn't that be interesting.

United States

Journal Journal: Mortgage Jubilee 9

Due to excessive greed and stupidity in the higher levels of repackaged mortgages, you might have the opportunity to own your property a bit earlier than you might have thought. Worth a look Mortgage jubilee

If by any odd chance people don't get the jubille reference, it is an old "all debts are cancelled" deal, plus pardons and whatnot. Basically, wiping the slates clean, start over.

  http://en.wikipedia.org/wiki/Jubilee_Biblical

  http://en.wikipedia.org/wiki/Jubilee_Christian

Security

Journal Journal: Untethering from the Utility Monopolies 14

Many more people are choosing to go "off the grid", untethering from traditional utility connections like electricity, natural gas, even municipal water and sewer, in whole or in part. Reducing demand while increasing your personal production of power can lead to energy independence, plus more security, and in a lot of cases, just plain more comfort.

Most off the grid people approach this situation from both ends, going to eliminate demand by wise construction techniques, using a lot more insulation, better windows, planned air in and out,etc. This drops the normal high level demand that most homes have and is the number 1 utility bill, for heating and cooling. Following similar steps, it is quite possible to enjoy all the niceties of modern life, without being part of the problem of massive fossil fuel use, along with eventually eliminating that monthly bill you can never pay off the traditional way of staying tethered. Another advantage is that these systems work-when the main centralized system doesn't.

They also mention in the article the concept of buyers clubs, getting together with other folks and negotiating bulk buy discounts for such things as solar PV panels, etc. The food co-op model taken to energy, which I have advocated in the past as one good way to reduce upfront costs. Another way to go there is the step by step method, just replace one circuit at a time, starting with your most critical "needs to work all the time" circuit.

Security

Journal Journal: Water, food, shelter, security 16

note: cross posted at my site as well:

Long time readers will know my big four survivalist needs, what to get independent on, are, in order of importance:

water, food, shelter, security

Now look at this BBC article about floods in Pakistan and what they determined to be the basic needs for all these displaced people

http://www.bbc.co.uk/news/uk-scotland-scotland-politics-10901896

"The government said the most pressing needs would be for clean drinking water, food, shelter and healthcare."

Pretty dang close!

And that is why I picked those out years and years ago, because I have "been there, done that" in emergency and "you are completely on your own" type situations. This is *my* tech expertise, threat analysis and mitigation.

People who "invest" in $1,000 TVs or the rigged crooked "stock" market, etc and such like and don't even have a good gravity water filter..eventually, this chronic dumbness is gonna bite them hard. EVERYONE will go through at least one-if not several- serious emergency situations in their lives, and it might last for a long time, weeks or months, who knows. If you ain't prepared..you are gonna lose it, bad. And you can NOT rely on government or "why don't *they* do something"?, you know this "they" guy over there someplace people always refer to when they mean anyone other then themselves. And this can be beyond some natural disaster, look at the economic situation, you could lose your job tomorrow, or the dingbats could decide we need a much larger war in the middle east and the price of crude could jump to 300 bucks a barrel..whatever, black swan events outside your control.

    Sorry, reality doesn't work that way with this "they" guy "saving you" or "doing something"!!

  Any medium to large scale emergency, there ain't a government out there, including all the rich nations, that has enough resources to do this. We don't have entire backup cities and regions just sitting around with all the infrastructure intact in warehouses or whatever, which is what it would take to come up with a huge numbers of refugees in need of aid situation, a large scale one. It is not possible, it doesn't exist, it isn't going to happen, so you will be on your own, so you need to get it in gear BEFORE any bad stuff happens, well before, that is acquire gear/supplies plus the needed skills to use that gear and supplies.

Just like with computer data, if you have no backups, and if something weird happens, you got nothing and will be in a world of hurt.

The Almighty Buck

Journal Journal: China and Brazil 3

Another example of how china is taking the west's surplus cash it ships there, and turns around and invests heavily in places to get access to their natural resources, then they turn around and sell to them, developing new markets.

The developed world is going to be the late not so great de-developing world pretty soon now. China invests in Brazil

All these western economists go on and on how we don't need "protectionism"..well, why is it then with china being so protectionist, they are advancing at a record pace? Could it be that some protectionism is necessary to keep from going bankrupt?

"Chinese firms have bought stakes in Brazil's electrical grid; they are building steel mills, car plants and a telecommunications infrastructure in that country. Chinese grain companies are negotiating to buy huge tracts -- some larger than 600,000 acres -- of Brazilian outback to plant soybeans. Chinese firms have the inside track on landing a huge high-speed-rail contract. They want to help realize Brazil's gargantuan plans -- estimated at more than $250 billion -- to tap its offshore oil reserves. "

And they have all this investment money because our glorious leaders said we didn't need old fashioned manufacturing, oh noes, that is passe', that we would be some sort of combo financial services (90% high stakes casino games), IP (ideas=dime a dozen), service (we'll mow each other's yards and get rich!) and governmental workers (in a shrinking economy, by all means, quadruple the size of government as the first step, raise taxes on those still barely producing any real wealth, plus add a few trillion in debt!) economy.

  Well, that mastermind theory sure has worked out just swell....and we still keep electing these people who let those pirates keep selling off what is left of the national seed corn for a fast buck. Corporate raiders, nation sized. Our political and economic "leaders"... When does this get to shift from just "sucky" to "treasonous" anyway? Oh, I guess that is passe' now as well, to be loyal to one's nation first.

And I can't blame China, they would have been stone idjits to not take the golden egg laying goose when it was offered. They are doing exactly what they are supposed to be doing as a nation, looking out for themselves FIRST. After that, sure, get generous, but if you can't take care of affairs at home first, you won't have any "extra" to be generous with. You have to make wealth before you spend it, that's the real economic bottom line, and manufacturing is the top way to make wealth today, closely followed by agriculture and mining/natural resource extraction.

    The big kahuna though, is the factory. Destroy your factories, you lose, end of story. You aren't replacing them with *anything*, that's the fairy tale they get people to believe in. Destroy your ag, you lose + starve, end of story. Sell off your natural resources cheap, fat city for some years..then you lose. You gain a few warlords who own a lot of yachts and limos and tanks and jet fighters eventually, that's about it for selling off natural resources cheap, that's the end game there.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...