The new EricMartindale.com is an experiment in data aggregation, and might have a few bugs. Feel free to explore, and then provide feedback directly to @martindale.

search results for engineering

Random Tier 4 Tech Support Musings

I take phone calls from customers, diagnose and estimate the length of time it will take to fix their problem, and schedule an appointment for an engineer to be there. It is then my duty to dispatch this appointment to the engineer, at the appropriate point in time.

At this point in time, I am no longer associated with your on site service. If the engineer does a bad job, it is my job to talk to you and determine if the problem requires the engineer to go back out and solve the issue, and determine whether or not it requires billing.

Do not vent your stress to me. I will get the engineer in contact with you as soon as possible.

Do not yell at me because the engineer was unable to make it at the scheduled time. I will have an engineer to you as soon as we can, I promise. Sometimes appointments take longer than expected, and sometimes cars break down.

That is all.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/110956921859349353362" oid="110956921859349353362">Grant... in reply to

+Grant Matheny there've been talks about manual targeting and piloting in EVE for a long time, and you're right -- it's always a question of the engine.  It's an engineering challenge that they'd need to tackle, but imagine the mission types and new tactics that could be created in EVE itself if they did.  It'd bring immersion to a whole 'nother level (and they'd be tackling the collision detection problem at the same time).

It makes sense to put Valkyrie in the hands of a [large] private group of beta users until the engine is fixed so that the other mechanics can be tested, but without integration I worry that the players would be more drawn to the immediate gratification of instant space battles in a way that DUST didn't fill, thus it'd be a drain on the EVE playerbase.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Find Largest Tables in MySQL

If you're trying to find what tables in your MySQL deployment are consuming the most amount of space, you can use the following query to find this information directly from the information schema.

SELECT CONCAT(table_schema, '.', table_name), CONCAT(ROUND(table_rows / 1000000, 2), 'M') rows, CONCAT(ROUND(data_length / ( 1024 1024 1024 ), 2), 'G') DATA, CONCAT(ROUND(index_length / ( 1024 1024 1024 ), 2), 'G') idx, CONCAT(ROUND(( data_length + index_length ) / ( 1024 1024 1024 ), 2), 'G') total_size, ROUND(index_length / data_length, 2) idxfrac, engine FROM information_schema.TABLES ORDER BY data_length + index_length DESC LIMIT 25;

You'll get a list of the top 25 tables by total size (index size + data size), how many rows they have, and the engine they are using to be stored. Being able to see what engine is being used is especially helpful when running MySQL Cluster.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Search Engine Roundtable: Why I'm Unsubscribing

Dear Search Engine Roundtable,

Since I subscribed to your feed (in early 2005), I have received and read every post you've made using my RSS reader of choice (Google Reader, currently). Your excerpts have been enticing, with well-written post titles and seemingly interesting topics. The idea was good, to aggregate content and discussions about Search Engines from multiple locations at one central blog.

Unfortunately, I've found that your articles are less informative than I'd have hoped, with frequent referrals to other locations where the conversations are actually taking place. Instead of effective bullet points and topic reviews, I find quick and hastily-written overviews of the content and discussion in question.

Not only that, but you're only providing partial content in your feeds! When I come across your posts in my daily reading of over 500 posts, you've caught my attention with your title - and because you're only giving me the partial article text, you've got me clicking through to your site (hoorah, ad impressions!). Unfortunately, half the time I'm wasting even more time by being forced to click through to yet another page to follow the conversation.

I rarely (if ever) find myself sharing your content, and from what I can tell from a cursory glance - you've never shown up in my shared items feed. (PS, when will I be able to control this page, Google? I hope this link juice means something in the future. Maybe even market that page in a bit more of a controlled fashion. I digress.) I've maybe starred one or two of your articles for future reading, but again - when I do finally read the posts, I find that I'm disappointed by your article quality and content.

What's up with that?! Alright, rabid feedreaders and social media evangelists - tell me if I'm in the wrong here, but I'm going to unsubscribe from Search Engine Roundtable.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math. Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1]. One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3]. I've included a transcription of her work [4], showing just how thorough and detailed she was. It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years. One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927. Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg. Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5] Here are a couple other notable women that deserve recognition: - Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6] Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8] - Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates. Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine. Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10] So, what women do you revere in science, technology, engineering, or maths? #AdaLovelaceDay #STEM [1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf [2]: http://sydneypadua.com/2dgoggles/demorgan.gif [3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true [4]: http://www.fourmilab.ch/babbage/sketch.html [5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html [6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html [7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44. [8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html [9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html [10]: http://directory.findingada.com/stories/

Attachments

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

16 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology,...

October 16th is Ada Lovelace Day, in which we celebrate women's achievements in science, technology, engineering, and math.

Ada Lovelace is heralded as the first computer programmer, writing programs (calculating Bernoulli Numbers) for Charles Babbage's Analytical Engine as early as 1843 [1].  One of the most prominent mathematicians at the time, August de Morgan, had impressive things to say about her abilities, “which would require all the strength of a man's constitution to bear” [2], and Babbage himself highlighted her prowess over other contemporaries to Faraday, the legendary English scientist, in a succinct personal correspondence [3].  I've included a transcription of her work [4], showing just how thorough and detailed she was.

It's important to take a moment to note some of the other women who have made significant contributions to the advancement of society over the years.  One of my favorites is Marie Curie, seen in this photo as the only women to appear alongside the intellectual powerhouse that assembled for the Solvay Conference in 1927.  Seated between physicists Planck and Lorentz, she is in good company along with the likes of Einstein and Heisenberg.

Curie remains, to this day, the only person to have ever won a Nobel Prize in multiple sciences. [5]

Here are a couple other notable women that deserve recognition:
- Gertrude Belle Elion (biochemist): Nobel Prize in Physiology or Medicine, 1988. [6]  Gertrude invented an incredible swathe of drugs using innovative new research methods [7], including the first treatment for leukemia. [8]
- Jane Goodall (primatologist): outstanding achievement in anthropology through her incredible 45-year field study of wild chimpanzees [9] which has wildly changed the school of thought in regards to man's connection to primates.  Goodall has been a role model of mine since I first encountered her and her work as a child reading National Geographic Magazine.

Instead of letting today pass only remembering one woman's contributions, take a moment to share your story and your female role model. [10]

So, what women do you revere in science, technology, engineering, or maths?

#AdaLovelaceDay   #STEM  

[1]: http://www.cs.virginia.edu/~robins/Ada_and_the_First_Computer.pdf
[2]: http://sydneypadua.com/2dgoggles/demorgan.gif
[3]: http://books.google.com/books?id=vKesSblgySgC&lpg=PA164&as_brr=0&pg=PA164#v=onepage&f=true
[4]: http://www.fourmilab.ch/babbage/sketch.html
[5]: http://www.nobelprize.org/nobel_prizes/nobelprize_facts.html
[6]: http://www.nobelprize.org/nobel_prizes/medicine/laureates/1988/elion-autobio.html
[7]: Holloway, M. (1991) Profile: Gertrude Belle Elion – The Satisfaction of Delayed Gratification, Scientific American 265(4), 40-44.
[8]: http://pubs.acs.org/cen/coverstory/83/8325/83256-mercaptopurine.html
[9]: http://ngm.nationalgeographic.com/ngm/0304/feature5/fulltext.html
[10]: http://directory.findingada.com/stories/

Attachments

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Duality

Eternal Sunshine of the Spotless Mind is a really weird movie, and it really scared me.  Not only is the concept nail-head-on, but I used to be called Jim Carrey, and some say I bear a striking resemblance to him in my expressions.  Well... yeah.  It's difficult to explain.

So what, I got over that.  But then, just when I thought the worst was over, I was randomly Googling - the verb form of to search the google search engine - and then... BOOM! HEADSHOT!

http://www.bbc.co.uk/dna/ww2/A5089836

Okay, I can handle someone from WW2 looking almost like myself - and the fact that he's a pilot, one of my dreams.  Okay.  I can handle that.  And then...

http://www.artofcombat.com/instructors.htm :
The training group (SOI) in Dallas was small and under the guidance of Eric Martindale (which promoted Ralph to 9th kyu), ....

I can handle a martial arts instructor being named Eric Martindale as well, a little odd, but then again, I've always been involved in martial arts, haven't I?  Eric apparently promoted that guy to 9th kyu, right?  So don't you have to be 10th kyu?  So he's 1337 like that, right?    ...      And then...

And of course there's the soccer referee, or is he a player?  I don't remember.  He's another Eric Martindale.  A little weird, too... but I've played soccer since the age of five.  And then...

http://www.rtpnet.org/troop200/history/T200Eagles.html

I became an Eagle Scout, too.  When I was a young boy... I was once a cub scout aspiring to be an Eagle Scout.  Dun dun dun.  The plot thickens.

http://www.e-budo.com/forum/showpost.php?p=211703&postcount=15

Once again, I am involved in a martial arts situation, and I believe referring to the same Eric Martindale.  And then...

http://nhpresbytery.org/pdf/Graduates01.pdf

Holy crap, that IS me.  For real.  Only slightly unexpected at this point... after all of these STRANGE entries.  Slightly.  O_o ....

And then...

I've apparently lost myself on http://lostfriends.org - or is someone looking for me?  Oh... that's what I meant to say.  I haven't found myself there yet... but apparently Google did.  And then...

http://north-carolina.injuryboard.com/view.cfm/Topic=77/PAGE=2

I WAS on this page at some point... and this one is somewhat entertaining.  Apparently, in Charlotte during some point about a year ago, someone named Eric Martindale died in a car accident.  I believe I had four people come up to me that day and ask if I had died... I was about two hours north of charlotte at the time, and the "Eric Martindale" news had reached most parts of North Carolina and Virginia, and I got two phone calls, one from my mother - asking if I had died.   .... ... ... ... ....   And then...

http://www.faqs.org/usenet/news.announce.newgroups/rec/rec.autos.rotary

I'm the president of a North Carolina rotary club.  I've always been a fan of rotary engines... but this is ridiculous... WTFH? ....  I'm becoming very frightened at this point... very frightened.  I love rotary engines.  That rotary club is two cities away.  ...  And then...

http://www.wrestlingusa.com/02%20wusa%20web%20root/highschoolnews/wisconsin.html

I used to wrestle, but I've never been to Wisconson.  Or.   Have I.

"The One", any one?  Whoa!  The Matrix!  42!

--
Eric Martindale
IT Professional
Admin of GWing.net

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Thanks for this post <span class="proflinkWrapper"><span... in reply to

Thanks for this post +Eric Martindale. As a new Engineering student, I could use all the advice I can get, especially in making a decision on what to specialize in in grad school. And anyone on this post if I have circled you, I put you in my Engineers circle. Thank you all for the informative discussion here :-)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Search Resumes Using Google

Oooh, someone's a clever cat. I was thumbing through Google Analytics today (like I do every day), and I was looking at what keywords people were using to find my site. I came across an interesting one:"social media" "search engine optimization" (inurl:resume | intitle:resume) Either someone is researching competition, or there's someone looking to hire people for a job they could do themselves. My guess is the former. Whoever you were, good job!

I bet you could do a search like, "lead developer" (inurl:resume | intitle:resume) and get some pretty tasty results. Or, perhaps someone wants to develop a custom search engine that utilizes Google to find highly ranked resumes? There's some nice and crunchy ideas.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

20 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not...

While hiring the first five engineers here at +LocalSense, we've never looked at someone's résumé. Not even once. One of the greatest things about the business world today compared to a decade ago (or even a couple years back!) is that you can directly qualify someone's past work through, at least for software engineers, tools such as GitHub [1]. The best measure of a potential hire's impact is going to be direct observation of their past work, and not a page or two of biography on the individual and their credentials.

Now, this approach remains difficult for more traditional careers in fields like academia and publishing, which simply don't have the agility necessary for something like GitHub or Dribbble [2] to make the impact they have. They have an existing [rigid] infrastructure that places the barrier to entry of any disruptive technology prohibitively high. The most established sectors will struggle the hardest, and perhaps fail the most spectacularly.

[1]: http://github.com/
[2]: http://dribbble.com/

Attachments

Resumes are dangerous by Alex MacCaw

Author: Alex MacCaw, Content: I've been interviewing engineers for a while now, and it seems the more interviews I do, the more I realize how many my initial assumptions about hiring were wrong. F...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Too bad that is not the... in reply to

Too bad that is not the kind of engineering degree I am going for :-/

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Engineer - 3 Minutes. I... in reply to

Engineer - 3 Minutes. I guess this is my second childhood, :)

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Join us for a conversation with cryptocurrency engineer Ryan Charles on insights gained from a career...

Join us for a conversation with cryptocurrency engineer Ryan Charles on insights gained from a career in building some of the most interesting projects in the Bitcoin space, from BitGo to Reddit Notes.

Attachments

DECENTRALIZE Episode 30: Ryan X. Charles

Join us for a conversation with astrophysicist-turned-cryptocurrency engineer Ryan X. Charles on insights gained from a career in building some of the most interesting projects in the Bitcoin space, from BitGo to Reddit Notes.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I&#39;m actually not worried too much... in reply to

I'm actually not worried too much about direct Eve integration. Sure, it'd be fun, but the physics engines aren't at all compatible at this point in time, and EVR is a great game in its own right. I'm hoping for Valkyrie to be separate for several years until the technical hurdles can be overcome such that we can fly all of our Eve vessels this way.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Hey thanks for this a whole... in reply to

Hey thanks for this a whole bunch +Eric Martindale ! As a pre-engineering software development student, I am grateful for good advice. I'll be going over to GitHub. I'm sure the interaction will be helpful.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/109596373340495798827" oid="109596373340495798827">Daniel... in reply to

+Daniel Ely Rankin thanks, appreciate it. Feel free to give me your thoughts. My startup is already taking into account things like GitHub accounts in how software engineers should be evaluated but if you have other ideas on how you think a potential employer could fairly evaluate a canidate outside a resume, I'm always open to some ideas.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/101621338281324923524" oid="101621338281324923524">Johnny... in reply to

+Johnny Roquemore Chee is the engineering manager of hangouts :p +Eric Martindale you should send some feedback, and it will be guaranteed to be read in 3 months.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/101083409996291093741" oid="101083409996291093741">AmyLynn... in reply to

+AmyLynn Arrington you could try udacity.com where there is a course on making a search engine which will also teach python. Or you can check out MIT OCW Introduction to Programming video lectures on YT. And then there it http://tryblock.com for Ruby

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/104973761519912571719" oid="104973761519912571719">Christa... in reply to

+Christa Laser there's been a lot of attempts at visual programming over the years. none really took off in any major way. while such languages/systems might be effective to entice someone to start writing simple programs, they won't make them an effective engineer/developer.. The basic constructs in any language are really simple and easy for non-techies to grasp, however, its the algorithmic and data structures aspect that need study.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

<span class="proflinkWrapper"><span class="proflinkPrefix">+</span><a class="proflink" href="https://plus.google.com/113956034040441194202" oid="113956034040441194202">Lisa... in reply to

+Lisa Way Good point. Capitalism is merely the right to own property. Free Markets, Libertarianism, Austrian Economics, and Right-Anarchism simply have shared ground and tend to go well together, but are importantly different things like Physics, Engineering, or Mathematics.

I think the idea that Capitalism and Self-Ownership are inseparable is a powerful idea that is in the heart of every person that came to the US with NOTHING looking or a better life. Too bad so many people born here don't understand that.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

MySQL Cluster: Generating Partition Reports

If you're using MySQL Cluster and have recently added a nodegroup, you can use the following code to generate a report of what tables are currently partitioned across the nodes as you apply ALTER ONLINE TABLE ... REORGANIZE PARTITION to them to get them partitioned:

select count(p.table_name) as partitions, p.table_schema, p.table_name from tables t join partitions p on (t.table_schema=p.table_schema and t.table_name=p.table_name) where t.engine='ndbcluster' group by p.table_schema, p.table_name order by partitions desc;

You'll get a nice clean report of all your tables, what schema they belong to, and how many partitions they have. Use in combination with my method of finding the largest tables in MySQL and you'll ensure smooth growth of your cluster!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I&#39;ve been working for an industrial... in reply to

I've been working for an industrial company that's still struggling with the very idea of open-source, so unfortunately there's nothing on github I can point a potential employer at. I guess in theory I ought to be doing something on the side just for that reason, but after writing code all week long, it's not exactly high on the list of priorities in my free time. :-)

100% agree with the sentiment though -- résumés are almost worthless for Software Engineers. Once in a while I can tell that someone's not completely inept, based on the specific way they describe their current/past work on a CV. But even then, it's hardly worth the time it takes to sift through the pile, vs. just bringing people in to talk for a bit.

A few lines of code are worth a thousand words. HR at large companies tends to get bogged down with the specifics of which languages/technologies they know, but that's missing the point entirely. If you can just have someone design a small system in pseudocode that solves some simple problem, the orders-of-magnitude difference in talent between individual programmers becomes obvious.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Something that wish would have caught... in reply to

Something that wish would have caught on as Node did is RingoJS (http://ringojs.org/), a CommonJS runtime that uses Rhino/JS and runs on the JVM.

Ringo IMHO could have sparked a Java renaissance and taken advantage of the maturity of the Java platform where they running joke is for any giving feature, you have at least 5 different libraries that can do it. That would solve what is a real problem in Node: the fact that libraries are sparse and either require coding yourself or finding a C library and writing a JS meta layer.

A RingoJS app doesn't need a special runtime environment or a hosting provider to enable it, if you can run Java, including Google App Engine. But alas, it wasn't to be, the same individuals who have no business touching a server yet are coding Node because it's just JavaScript. They were the same ones who decried Java as a big slow mass because they couldn't understand the mechanics of not blocking the event handling thread.

The Rubyists eventually got over their hatred of Java, when will the JavaScripters?

Sigh

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

An Update To EricMartindale[dot]com

A Screenshot of Eric Martindale\'s LifestreamAs of today, I've changed the address of my blog from just EricMartindale.com to a new location that will contain my blog posts in a new format. Don't worry though, all your old links will still work just fine.

Why am I doing this? Well, there are a number of reasons why - not the least of which are some SEO (search engine optimization) adjustments that I'm in the process of making. However, the biggest and most important thing to you is the introduction of Eric Martindale's Lifestream, which is the newest and latest feature of EricMartindale[dot]com. This new area of the site is called a Lifestream because it will show you everything that I've been doing lately, from shared posts on Google Reader to photos from Flickr.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

The idea that we&#39;re somehow disadvantaged... in reply to

The idea that we're somehow disadvantaged should the entire system crash, compared to our parents or grandparents, is silly and myopic. Living off the land flat out wouldn't/couldn't happen. There's simply to many people for everyone to hunt. If everyone started hunting/fishing to get food a) we'd run out of space in the forest/river shores and be killing one another for a spot b) even if we remained civilized we'd kill off everything so fast it wouldn't matter. Do you seriously think we get all those burgers by people taking care of cows... we don't... we have a whole technological industry built up around shoving as many into a small area and keeping them alive long enough that we can eat them. Chickens? Ya same thing. If it REALLY got so bad that "the grid" collapsed you're no better off than anyone else.

I have no idea how this turned into an end of the world/I can survive without a computer thread. This article isn't stating that everyone has to be in tech; only that going into tech/training/educating yourself for a world that is fully tech enabled is something you should do. He states in the second paragraph, "....and all the college kids wondering if a CS or engineering degree will pay off. To those readers: we might be in a bubble, but for you it doesn’t matter." Then in the fourth paragraph, "The truth is that the technology sector as a whole over any length of time is a positive-sum game even if the economy doesn’t grow at all..." In short, if you're looking to go into tech field you should still do it. Thanks for sharing this +Eric Martindale, good stuff!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air ...

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Strategist +Gareth Kay; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live!

The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

Attachments

TSBW #28: Technology, Learning, Toys, Live Music and More! (On Air Hangout)

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live! The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air ...

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Strategist +Gareth Kay; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live!

The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

Attachments

TSBW #28: Technology, Learning, Toys, Live Music and More! (On Air Hangout)

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live! The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air ...

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Strategist +Gareth Kay; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live!

The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

Attachments

TSBW #28: Technology, Learning, Toys, Live Music and More! (On Air Hangout)

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live! The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air ...

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Strategist +Gareth Kay; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live!

The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

Attachments

TSBW #28: Technology, Learning, Toys, Live Music and More! (On Air Hangout)

Wow, the 28th episode of my weekly show, thank you guys for being so supportive of my weekly on air G+ variety show +That Show with Billy Wilson (TSBW). The show brings together some of the most interesting people you can find on G+ for a hangout! This week I'll have joining me Entrepreneur, Entertainer, and Geek +Chris Pirillo; Creator of the Uglydoll Brand +David Horvath; +Liz Krane of LearningNerd.com; Linux System Admin +Liz Quilty; Engineer +Eric Martindale; and Special Musical Guest +Meri Amber ! You can talk with us and other people watching the show by commenting on this event once the show is live! The episode will be live on this event and the recording will be available immediately afterwards. You can watch previous episodes here: http://goo.gl/ceHtH

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Tips for Artists first joining Google+ Now that it's public i'd like to share some tips that i think...

Tips for Artists first joining Google+

Now that it's public i'd like to share some tips that i think enrich your experience here and help your art be heard and seen and some new ways of profiting from it.

1. Re think your marketing strategy
I see a lot of artists still using the site like twitter or facebook and just posting songs and not giving any inside story about how it came to be or what influenced it. Give people a reason to comment on your posts and continue that discussion.

2. Collaborate with artists outside your medium
One of the most rewarding things about this site is the quality of the community here. As a musician, think of ways you can collaborate with photographers, graphic artists, software engineers etc.. This idea i think is the future of how artists of all mediums can be profitable and retain their artistic integrity ( i have a collaboration with +Colby Brown and +byron rempel that i'm working on right now that will showcase this)

3. Be Humble or at least be real
The major change for artists that i feel is coming is how this amount of engagement and deeper connectivity will promote certain types of artists. Don't think that no matter how talented you are you can get away with thinking your art is enough to stand on it's own. Also, promote who you are and get people invested in who you are as a person and let them find out about your art if they want to know more about you, but don't push it on to people.

CC: +Natalie Villalobos, +Ryan Crowe, +Robert Scoble

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Tips for Artists first joining Google+ Now that it's public i'd like to share some tips that i think...

Tips for Artists first joining Google+

Now that it's public i'd like to share some tips that i think enrich your experience here and help your art be heard and seen and some new ways of profiting from it.

1. Re think your marketing strategy
I see a lot of artists still using the site like twitter or facebook and just posting songs and not giving any inside story about how it came to be or what influenced it. Give people a reason to comment on your posts and continue that discussion.

2. Collaborate with artists outside your medium
One of the most rewarding things about this site is the quality of the community here. As a musician, think of ways you can collaborate with photographers, graphic artists, software engineers etc.. This idea i think is the future of how artists of all mediums can be profitable and retain their artistic integrity ( i have a collaboration with +Colby Brown and +byron rempel that i'm working on right now that will showcase this)

3. Be Humble or at least be real
The major change for artists that i feel is coming is how this amount of engagement and deeper connectivity will promote certain types of artists. Don't think that no matter how talented you are you can get away with thinking your art is enough to stand on it's own. Also, promote who you are and get people invested in who you are as a person and let them find out about your art if they want to know more about you, but don't push it on to people.

CC: +Natalie Villalobos, +Ryan Crowe, +Robert Scoble

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Display Foursquare Badges in Chyrp without using Javascript

If you notice, I currently display my Foursquare badges over in the right hand side. I'm not sure about how long I'll display them specifically, so here's a screenshot:

I recently received an email inquiring about how I accomplished this. Well, since I use Chyrp, here's how I did it:

  1. In includes/controller/Main.php, add the following, somewhere around line 715 (immediately after $this->context["sql_queries"] =& SQL::current()->queries;): // BEGIN Foursquare Badges $cURL = curl_init(); curl_setopt($cURL, CURLOPT_URL, "http://api.foursquare.com/v1/user.json?badges=1"); curl_setopt($cURL, CURLOPT_HEADER, 0); curl_setopt($cURL, CURLOPT_RETURNTRANSFER, 1); curl_setopt($cURL, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); curl_setopt($cURL, CURLOPT_USERPWD, "your@email.com:your_password_here"); $strPage = curl_exec($cURL); curl_close($cURL); $foursquare = json_decode($strPage); $badges = $foursquare->user->badges; foreach ($badges as $badge) { $this->context['foursquare_badges'] .= '<img src="'.$badge->icon.'" title="'.$badge->description.'" />'; }
    // END Foursquare Badges
  2. In themes/your_theme_name/content/sidebar.twig, wherever you want to display your foursquare tags, simply add: <div> <h1>Foursquare Badges</h1> $foursquare_badges </div></code> You can display this wherever you like, in any part of your Chyrp template.

Be aware that this requires PHP's CURL module. I encourage you to enable Chyrp's caching module as well, so every page load does not incur a single API request (I have a feeling that they probably won't appreciate it). The benefit of this is that your Foursquare badges will now be output by your server, so they are both indexable by search engines and degrade very gracefully when the client doesn't have Javascript enabled (NoScript users, particularly).

Enjoy!

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

Progeny of Monotony

A big subject of contention in my life is my job. I work 60 hours a week, for less than minimum wage. I deal with clueless customers who are often surprised by my perfect greeting, as I am often complimented, sometimes chastised, on my well-rehearsed voice. Sometimes I think we lose call volume because I sound like an answering machine. Hah! It shall be no more, tonight was a successful night of Trixbox PBX goodness, our entire system is on the first run using the IVR answering. I digress.

My job sucks. I earn $5/hr, working what is supposed to be 60 hours a week, but is slowly dwindling downward. The stress of paying rent, utilities, and heaven forbid taxes on such a budget is indomitable: I can't imagine adding insurance and gas to this, when I get a car up and running. The love of my life chastises me for it, and I can't tell her enough how much I really do hate it. I do not have a working car, and I do not yet have insurance to provide the DMV with proof that I do have insurance, so I don't have a license. There are fast food places within walking distance, surely. Ideally, if I had a car, I could be an on-call Engineer and earn maybe an extra hundred bucks a week. Sure, I earn $33/hr as a consultant, but when business is the equivalent of dysentery on a hot summer day, I earn jack for nothing. Of course, in this scenario, it is difficult to find the finances to afford a car to begin with.

It's hard in these circumstances to even consider such things as school, a degree, or better living conditions. It's devastating to me, my life, my relationships, and everything that cascades on from such. It doesn't help when the doors in my house are left open, dissipating what little heat I've trapped in the kitchen into the other frozen rooms of my apartment. Piles of dirty dishes plague the sink, and I'm never home to wash them. Wait, remind me again why I'm washing someone else's dirty dishes? Oh, that's right - my apartment would be even dirtier if it weren't for the thirty minutes a night I spend after getting home from spending the remainder of my free time with Amber. Of course, directly after, shower and bed. Only to wake in the morning for work at 0800. Monday. Tuesday. Wednesday. Thursday. Friday. Saturday.

If only people were patient, if only I could let them into my world. Unfortunately, I'm expecting a box to be placed on my doorstep any day now, with all of the various items I've gifted out over the past year and a half. There's nothing I can do to stop it, as far as I can tell, except to go work at Subway. I wish I could tell her that it'd be by the grace of God if I got out of that position, once I went there. No, it's not understood. It can't be understood. How long can one love without being loved in return? The sad thing is, it is in both ways. How sick and maniacally twisted is that?

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

New Chapters

After a year and a half working with some of the smartest and most competent engineers I've ever met, it's time for me to part ways with BitPay. I've had the opportunity to be deeply involved in the design, implementation, and deployment of some incredible technologies, but we're turning a page in the story of Bitcoin's rise and it's time to start exploring the new chapter. BitPay continues to paint an incredibly compelling picture as to what the decentralized future looks like – we worked on some incredibly far-reaching and massively impactful ideas, including: - [ChainDB][chaindb], a distributed database backed exclusively by the Bitcoin blockchain. - [Copay][copay], a truly decentralized wallet & identity management platform. - [BitAuth][bitauth], a secure authentication mechanism for peers on the web, using the `k1` curve. - [Impulse][impulse], a method of securing zero-confirmation transactions. - [Foxtrot][foxtrot], a completely encrypted data transmission network. - [Bitcore][bitcore], a library of common software functionality to glue everything together. You might notice a few common themes. Let me point out the two most important. Firstly, that everything here is open source (with the notable exception of ChainDB). Open source, and more importantly [free software][free software], is a very big deal to me. Prior to joining BitPay, I was [open sourcing education][coursefork], [contributing to open source software](https://github.com/martindale), and [speaking on the importance of open source](https://www.youtube.com/watch?v=iuYLWdG-lP0). Some of the things I'm most proud of are the things _other_ people built with the things _we_ gave away – _that's_ the real power of open source. Secondly, that everything here is based on Bitcoin, not some alternative blockchain. BitPay was a firm believer in Bitcoin as the exclusive platform that would secure the post-fiat era, and that belief has held strongly with me before and after my departure. Until a more compelling alternative to Bitcoin emerges, One of the other exciting things to come out of BitPay was the emergence of [DECENTRALIZE][decentralize], which we formed last fall with a few of our fellow employees. DECENTRALIZE has become [an acclaimed content source][cointelegraph:decentralize] in the latest resurgence of decentralized thinking, and now it gets to be a much bigger priority for me. Before I joined BitPay, I'd put a lot of work into [Maki][maki], a framework for making full-stack application development significantly easier. Maki took a bit of a back-burner position while I was focusing on my work at BitPay, so I'll be redoubling my efforts to see that vision through. In fact, I think now's as good a time as any to share that vision. To that end, I'm starting a new project named Fabric. I'd like to entirely eliminate centralized servers on the Internet and catalyze the development of an entirely new class of economic actor. More details soon. As we embark on our next journey, let's always remember the carefully selected input used to create [the Genesis Block][genesis]: > The Times 03/Jan/2009 Chancellor on brink of second bailout for banks [chaindb]: https://bitpay.com/chaindb.pdf [copay]: https://copay.io/ [bitauth]: https://github.com/bitpay/bitauth [impulse]: https://impulse.is/ [foxtrot]: https://github.com/bitpay/foxtrot [bitcore]: https://bitcore.io [decentralize]: https://decentralize.fm [free software]: http://www.gnu.org/philosophy/free-sw.en.html [coursefork]: https://coursefork.org/ [maki]: https://maki.ericmartindale.com/ [cointelegraph:decentralize]: http://cointelegraph.com/news/114496/leaders-in-bitcoin-broadcasting-pandoras-box-is-open-and-theres-no-going-back [genesis]: https://en.bitcoin.it/wiki/Genesis_block

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand

Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring #cryptofinance, we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance, give me a shout.  We're extremely focused on  #OpenSource and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

2 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RSS is back, or "a brief history of EricMartindale.com"

Hello there, adoring internet-stalkers! (I'm kidding. ~_~) You may have noticed (if you were loyal, that is ;)) that my Feedburner-powered RSS Feed has been lacking in activity lately. There's a reason for that.

Recently, I got rid of WordPress and Sweetcron in favor of a new CMS platform, Chyrp. I had been running Wordpress for a long time, using it to share my thoughts with the general internet populace. However, it had become a bit of a chore to maintain, and it really felt like duplicate work on top of all the other content-generation I was already performing (i.e., forum posts, blog comments, Last.fm "Loved" Tracks, Google Reader shared items, etc.), so I began to look for a way to aggregate this content into a central place.

For a while, FriendFeed served this purpose well, but I didn't like the lack of control I had over the source. Facebook also filled part of this gap (and it still does, to a point), and they've even purchased FriendFeed, but I was looking for something quite a bit more customizable and self-hosted. Through various referrals, I came across Yongfook's Sweetcron project which was a new platform designed specifically for this new thing they called, le gasp, "Lifestreaming".

However, after fighting with Sweetcron and its aggregation methods, particularly its lack of support for various service feed formats; I decided to look into something else. Initial searches landed me upon Tumblr, who had conveniently announced a feature that syncs comments across multiple services (or aggregates). Sadly, I didn't want to get back into a world where all my code was hosted by someone else, and I had no control over it. I kept Sweetcron running on my site under lifestream/, but I continued searching for a better solution.

I then stumbled across Bazooka, which was billed as "the first free PHP tumblelog engine". Thanks to Bazooka developer Evan Walsh, who alerted me to a more up-to-date and current replacement called Chyrp. And I was sold. I immediately spent a few hours converting my existing content from WordPress and SweetCron over to a test installation of Chyrp, and then took the next night changing my site structure and 301'd all my old links to the new URLs.

That's where EricMartindale.com stands today. I've spent a few weeks getting my stream set up the way I want it, and I'm turning the RSS feed back on. Posts should begin flowing into your RSS reader very shortly. Post comments, feedback, and questions here!

Edit 10:13 PM EST: It looks like Feedburner is having some trouble parsing my new RSS content. You can subscribe to my direct feed and it will always work.

Edit 10:58 PM EST: I've fixed the problem and committed the patch to GitHub.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

BitPay Expands, Fueled By Bitcoin Demand Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia...

BitPay Expands, Fueled By Bitcoin Demand
Yes, we're expanding.  While +Wells Fargo [1] and +Wikipedia [2] start exploring    #cryptofinance  , we're also moving full steam ahead towards getting every company in the world to accept  #bitcoin   as a payment option.

Not only have we hired the best from companies like +Red Hat+IBM, and Visa into our senior leadership, but we've established a firm position in the marketplace–we're now performing over $1,000,000 per day in transactions with Bitcoin, and there are now over 1,000 new businesses accepting Bitcoin every week.  Now, we're hiring to support this investment in the community.

If you're interested in building anything related to  #cryptofinance  , give me a shout.  We're extremely focused on  #OpenSource   and  #cryptography  , and will be spending a lot of our time [3] participating in the support of developers building applications in the space.  If you want to build something that will shape the future of the world,  #cryptofinance   is the right space to be in.

[1]: http://www.reuters.com/article/2014/01/14/us-wellsfargo-bitcoin-idUSBREA0D1LL20140114
[2]: https://twitter.com/jimmy_wales/status/441632741352681472 and http://www.reddit.com/r/Bitcoin/comments/201fa6/hello_from_jimmy_wales_of_wikipedia/ !
[3]: We've already released Bitcore (see bitcore.io for more information), but we'll be a major presence in number of events in the coming year (not the least of which was +LAUNCH most recently!).  We're on a tear to support engineers building new projects with  #bitcoin  , so feel free to reach out and let me know what you're working on.

Attachments

Atlanta's BitPay expands HQ, fueled by Bitcoin demand - Atlanta Business Chronicle

Even as the fate of cryptocurrency Bitcoin whipsaws amidst controversy and volatility, one Atlanta-based Bitcoin services company is doubling down.

3 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

8 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article...

I've just learned of a virus that was launched against the U.S. Drone Fleet. See the attached article from Wired.

Earlier this year, the Pentagon recently concluded that digital attacks such as this can constitute an act of war [1]. This one doesn't [yet] seem as sophisticated as last year's attack on Iran's nuclear reactors by Stuxnet [2], but it continues to show how important and integral our computer systems are in this rapidly changing world. Security professionals +Alex Levinson, +Jerome Radcliffe, and +Scott Hanselman surely have some great insight here, I highly recommend you go take a look at some of the things they've written.

In 2009, a very sophisticated [and successful] cyber-attack was launched from inside China that targeted the United States through Google and Adobe [3] that caused surprisingly few stirs within our government, especially after NATO was sent in to assist in the defense of Estonia's computer systems during the 2007 attacks [4]. Not long after this, the widely-used and [formerly] explicitly trusted RSA security mechanism, used in a large number major institutions around the world. was completely and entirely broken [5] by an embarrassingly simple hack [6].

Aside: We can look back at some of the things actual software engineers like +Ryan Dahl [7] and +Zack Morris [8] have been saying lately and quickly conclude that there's something fundamentally broken with the whole system. If you've ever worked on or with a large software project, you can see evidence of negligence and ignorance alike embedded at every level. It certainly contributes to if not causes these types of security concerns.

[1]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[2]: http://www.schneier.com/blog/archives/2010/10/stuxnet.html
[3]: http://www.wired.com/threatlevel/2010/01/operation-aurora/
[4]: http://www.wired.com/politics/security/magazine/15-09/ff_estonia
[5]: http://www.computerworld.com/s/article/9214757/RSA_warns_SecurID_customers_after_company_is_hacked
[6]: http://www.zdnet.co.uk/blogs/mapping-babel-10017967/rsa-hack-targeted-flash-vulnerability-10022143/
[7]: https://plus.google.com/115094562986465477143/posts/Di6RwCNKCrf
[8]: http://zackarymorris.tumblr.com/post/10973087527/the-state-of-the-art-is-terrible

Attachments

» Exclusive: Computer Virus Hits U.S. Drone Fleet

A computer virus has infected the cockpits of America's Predator and Reaper drones, logging pilots' every keystroke as they remotely fly missions over

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]...

I am drooling over WolframAlpha Pro: http://www.wolframalpha.com/pro/ [actual announcement attached]

"Computational knowledge engine" WolframAlpha [1] just announced a new offering aiming at power users of their already amazing data science toolkit. I'm very impressed with the features they've chosen to add, including image processing and 3D plot export. Maybe I'm just being a huge nerd, but I think this'll be great for generating assets for presentations and demos. :)

I already use WolframAlpha for quickly plotting relationships in certain algorithms, or referencing certain datasets. It's great for checking on specs like display densities [2], calculating a transfer time (while automatically cross-referencing network specs!) [3] or even looking for obscure computing metrics [4]. It can help you calculate chemical reactions [5], or even plot a protein structure. [6]

My favorite day-to-day application is quick and dirty regression, for visualizing trends in my data [7], but it's still cool to play with n-gram decomposition [8].

Google hasn't even come close to this level of utility, even with innovations like Google Squared [9] (which was sadly shuttered last year... [10]) and the addition of function plotting to their universal search earlier this year [11]. They've been rolling in more and more tidbits like this, but I don't know that a company as large as Google can keep up with the delta, even with again-CEO +Larry Page's war on cruft [12] freeing up resources for projects like this.

It's priced at only $4.99 per month (or $2.99 for students, which I am not -- but I'll happily pay the premium at this price point!), right up my alley as building something comparable for local use (or even acquiring an existing software package) would be prohibitively expensive and moreover, complex.

Have you used WolframAlpha? If so, what for?

[1]: http://www.wolframalpha.com/
[2]: http://www.wolframalpha.com/input/?i=2.5+megapixel+300dpi+display
[3]: http://www.wolframalpha.com/input/?i=data+transfer+time+10GB%2C+802.11n
[4]: http://www.wolframalpha.com/input/?i=How+fast+was+the+processor+on+the+Atari+400%3F
[5]: http://www.wolframalpha.com/input/?i=Al+%2B+O2+-%3E+Al2O3
[6]: http://www.wolframalpha.com/input/?i=myoglobin
[7]: http://www.wolframalpha.com/input/?i=quadratic+fit+%7B10.1%2C1.2%7D%2C%7B12.6%2C+2.8%7D%2C%7B14.8%2C7.6%7D%2C%7B16.0%2C12.8%7D%2C%7B17.5%2C15.1%7D
[8]: http://www.wolframalpha.com/input/?i=n-grams+%22the+google+plus+community+keeps+me+smiling+throughout+the+day%22
[9]: http://news.bbc.co.uk/2/hi/technology/8047076.stm
[10]: http://searchengineland.com/google-squared-news-timeline-get-added-to-googles-chopping-block-90549
[11]: http://googlesystem.blogspot.com/2011/12/googles-graphing-calculator.html
[12]: http://goo.gl/ay4I0

Attachments

Wolfram|Alpha Blog : Announcing Wolfram|Alpha Pro

Today’s introduction of Wolfram|Alpha Pro gives you fundamentally new and remarkable capabilities like: data input, file upload, image input, data download, CDF interactivity, extra computation time, ...

4 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

RPGChat Forum Review

RPGChat is one of the other large roleplaying forums out there, and they've been around since about May, 2001. Since then, RPGChat has gone through many evolutions, and has expanded rapidly - they started with a forum, grew into a decent sized roleplaying chat, and finally removed the chat and went back to forums.

RPGChat\'s Forum Index You'll immediately notice the large number of forums, which for most boards isn't an issue. In today's roleplaying world, RPGChat's index fits right in.

They've got four basic navigation options at the top of the page, which are images instead of text, which isn't very good for SEO. The four menu options are Home, Forums, Chat, and Rules. I gave each of them a shot, but it looks like only the "Home" and "Rules" link work.

I'm going to take a look at their code, because using images for links isn't horrible if you specify the right attributes. Let's have a glance:

<a href="http://forums.rpgchat.com/index.php"> <img src="header/but_home.jpg" border="0"> </a>

Yikes! Not only does the anchor not have a title attribute, but the image doesn't have an alt attribute! Search engines won't be able to understand the context of these links, and the flow of link juice to the two working links won't be very beneficial.

I participated on these forums for a few months as the username Alighieri, for that period, I became the single most active user in their welcome forum. I posted in several other topics, but got pretty frustrated with the limitation on the length of a post (20,000 characters).

When attempting to post a profile for one of my characters, I was immediately snubbed by the limitation. This makes well-researched posts difficult to make, specifically with the citations that must be put in place for accurate references. Ultimately, I was forced to cut out portions of my character's history to fit it into the post.

After posting for a few weeks nonstop in the Welcome Forum, I headed off to the The Arena area, where turn-based fighting is largely popular. I opened a topic with a list of the top turn based fighters, placed into a neat little image and posted right into the topic. It took a few days to get any response at all, (save for a few people who contacted me over AIM) and when I did get a response, I logged in to RPGChat to find that I had been banned for "advertising on multiple occasions", much to my surprise.

However, while my visit was cut short, I met some good friends, and had some great discussions. Unfortunately, the forum does not allow any links to external sites of any kind, and also does not allow signatures, which makes it very difficult to spread the word about the topics you start there. This isn't very good for encouraging member interaction, and makes it very difficult for momentum of any sort to be gained within the community.

RPGChat\'s LogoAfter speaking with someone who had messaged me on AIM prior to my banning, I confirmed my worst fears - RPGChat is a closed community, and is not very open to outside communities or positive interaction with those communities. This is the number one concern mentioned to me about RPGChat and their future, and there is ongoing fear of the community continuing to stagnate without any growth other than direct referral.

I sent a request via the site's contact form, as listed at the bottom every page, which merely opened a new email to their support address, forums@rpgchat.com - I sent a couple questions in my email, and I identified who I was, but I haven't yet received a response. It'd be great if we could get an interview with an admin from RPGChat on the history of the site!

In terms of organic visitors, a search for pages on RPGChat has about 16,200 results. When digging through the pages, I noticed that only 477 pages were in the primary index, with the remainder in the supplemental index. That's scary!

Let's take a look at their search results: Running a Google search on RPGChat

As you can see from the above search, we can confirm that there is some duplicate content problems. However, from what we've seen - most of RPGChat's traffic is a result of direct referral. We can identify with the importance of defensible traffic, but organic traffic is also a high-quality method of driving laser-targeted traffic to your site, and it looks like RPGChat is seriously missing out on this.

RPGChat has a relatively active forum; 63,708 threads, 1,925,709 posts, and 59,352 "active" members. While that's only an average of about 30 posts per thread and only about 32 posts per user, they do have some great quality and style elements in their posts that you simply don't see in many other places in roleplaying forums these days. I think it would be a great move for them to deactivate a lot of their older and inactive members, and send out reminders to these users to come back and join in on the fun.

It also seemed like a consensus that the single best area on RPGChat was the Clans & Guilds forum, which most users simply called "C/G" for short. It looks like most other forums' version of a multiverse, where roleplay is freeform, and most action is player-driven with rules being defined by the status quo.

Lack of availability aside, RPGChat leaves a pretty strong impression, and if you're careful to follow their 500 word list of rules, you can likely make some friends and enjoy some great high-quality roleplay. The administration needs to do some overhauling if they're going to keep the community healthy, but for the time being - RPGChat makes for a great roleplaying destination.

0 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

1 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

6 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.… The latest round of evidence of ongoing...

On the Ongoing Attacks between China, U.S., Russia, Israel, etc.…
The latest round of evidence of ongoing digital warfare between the superpowers is now being reported in the N.Y. Times [1] after an undeniably incriminating 60-page report on the Chinese attacks on the U.S. by security firm Mandiant [2].

“Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
                                                    — Kevin Mandia

The report goes on to track individual participants in the attack, tracing them back to the headquarters of P.L.A. Unit 61398.

Attacks from the Chinese have been ongoing for many years, notably back to Operation Titan Rain [3] in 2003, in which attackers gained access to military intelligence networks at organizations such as Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA [4].  Direct military targets were also included in the assault, such as the U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona, the Defense Information Systems Agency in Arlington, Virginia, the Naval Ocean Systems Center, a Defense Department installation in San Diego, California, and the U.S. Army Space and Strategic Defense installation in Huntsville, Alabama [5]. 

These ongoing attacks are labeled "Advanced Persistent Threats" or "APT" by the American Military, are considered acts of war by both the White House [6] and the Department of Defense [7] as far back as 2011, and are not unique to the Chinese origins.  You may remember the 2007 attacks on Estonia [8], which has been attributed to entities within Russian territory operating with the assistance of the Russian government [9].  These attacks disabled a wide array of Estonian government sites, rendering services in the world's most digitally-connected country unusable.  The attacks also disabled ATM machines, effectively disabling some portion of the Estonian economy.

The United States [and arguably Israel, [10]] have also been actively participating in these attacks [11] with the deploying of FLAME and Stuxnet against Iran, which made international headlines this past year when the coordinated efforts of the tools were used to disable Iranian nuclear centrifuges in an attempt to slow their progress in their nuclear program [12].  These efforts are ongoing, with the latest addition of the Gauss and Duqu malwares [13] continuing to target middle-eastern countries.

“From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.”
                                                    — +The New York Times

Obama reportedly went on to sign a classified directive last year [14] enabling the government to seize control of private networks, and the 2012 NDAA (National Defense Authorization Act) includes terms [15, section 954] that authorize offensive attacks on foreign threats [16].  The official United States policy already is to deem any cyberattack on the U.S. as an "act of war" [17], and it looks like these types of actions and attacks have already been made legal.

While it may once have been a subject of fiction [18], it's now and has been a harsh reality that we're in the middle of a new era in warfare, and the battles are already well-underway as countries around the world are openly engaging in offensive attacks on one another that are impacting economies on a massive scale.  I don't know what else to call this other than a world war—even the CIA's Center for the Study of Intelligence (CSI) predicted this [19], as have many others even earlier [20].  

Here's a thought; if our constitution gives us the right to bear arms, and the government deems these types of attacks as acts of war, then isn't it our right to keep and bear these arms?  Yet another case for a mass-algorate society [21], which Mr. Obama appears to agree with me on [22], at the very least.

[1]: http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html
[2]: http://intelreport.mandiant.com/
[3]: http://en.wikipedia.org/wiki/Titan_Rain
[4]: http://www.time.com/time/nation/article/0,8599,1098371,00.html
[5]: http://www.zdnet.com/news/security-experts-lift-lid-on-chinese-hack-attacks/145763
[6]: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
[7]: http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html
[8]: http://en.wikipedia.org/wiki/2007_cyberattacks_on_Estonia
[9]: http://www.vedomosti.ru/smartmoney/article/2007/05/28/3004
[10]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[11]: http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all
[12]: http://www.bbc.co.uk/news/technology-11388018
[13]: http://www.zdnet.com/meet-gauss-the-latest-cyber-espionage-tool-7000002405/
[14]: http://endthelie.com/2012/11/15/obama-reportedly-signs-classified-cyberwarfare-policy-directive-with-troubling-implications/#axzz2LMPlf8iA
[15]: http://www.gpo.gov/fdsys/pkg/BILLS-112hr1540enr/pdf/BILLS-112hr1540enr.pdf
[16]: http://endthelie.com/2011/12/17/approval-of-covert-offensive-cyberwar-sneakily-inserted-into-ndaa/
[17]: http://www.forbes.com/sites/reuvencohen/2012/06/05/the-white-house-and-pentagon-deem-cyber-attacks-an-act-of-war/
[18]: http://en.wikipedia.org/wiki/Neuromancer
[19]: https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no4/new_face_of_war.html
[20]: http://www.rand.org/content/dam/rand/pubs/reprints/2007/RAND_RP223.pdf
[21]: https://plus.google.com/112353210404102902472/posts/MVQXyw9EJDE
[22]: http://news.cnet.com/8301-17938_105-57569503-1/obama-endorses-required-high-school-coding-classes/

Attachments

China’s Army Is Seen as Tied to Hacking Against U.S.

An overwhelming percentage of the attacks on American companies and government agencies start in a building on the edge of Shanghai, say cybersecurity experts and American intelligence officials.

5 Replies

Replies are automatically detected from social media, including Twitter, Facebook, and Google+. To add a comment, include a direct link to this post in your message and it'll show up here within a few minutes.