Very interesting op-ed in today's New York Times: Slavoj Zizek calls athiests "Defenders of the Faith":
Fundamentalists do what they perceive as good deeds in order to fulfill God's will and to earn salvation; atheists do them simply because it is the right thing to do. Is this also not our most elementary experience of morality? When I do a good deed, I do so not with an eye toward gaining God's favor; I do it because if I did not, I could not look at myself in the mirror. A moral deed is by definition its own reward. David Hume, a believer, made this point in a very poignant way, when he wrote that the only way to show true respect for God is to act morally while ignoring God's existence.
My incredibly brave wife got into a Piper Warrior with me today, and we flew from Nashua to Portsmouth, N.H. I last flew in January 2005, also with Anne, so I was excited to get back into the cockpit.
Landing in variable 8-to-12 knot winds—variable, in this context, meaning direct crosswind to tailwind—was not the most fun I've ever had flying. But it was still tons o' fun, and we still got Anne home on time.
I lost my ID case last week here in New Hampshire, and had Anne overnight my passport to me so I could go home. It turns out, I needn't have been so paranoid, as reported on Bruce Schneier's security blog:
According to the TSA, in the 9th Circuit Case of John Gilmore, you are allowed to fly without showing ID -- you'll just have to submit yourself to secondary screening.
Here's a link to the 9th Circuit decision (pdf).
Frontal systems can be a lot of fun. A warm front passed through Southern New Hampshire today; see if you can spot when that happened:
|09:51 ET (14:51 UTC)
|12:51 (18:51 UTC)
The cold front following behind won't be quite as dramatic, but it will bring some wind. Gusts are predicted to 81 km/h (45 kts, 54 mph) this afternoon.
I'm not sure what Anne thinks, but as long as I'm commuting to New Hampshire, maybe we should get these Wi-Fi wine glasses:
Jackie Lee and Hyemin Chung, experts in human-computer interaction...have incorporated a variety of coloured LEDs, liquid sensors and wireless (GPRS or Wi-Fi) links into a pair of glass tumblers. When either person picks up a glass, red LEDs on their partner's glass glow gently. And when either puts the glass to their lips, sensors make white LEDs on the rim of the other glass glow brightly, so you can tell when your other half takes a sip. Following tests in separate labs, Lee says the wireless glasses really do "help people feel as if they are sharing a drinking experience together."
MSNBC is reporting today that thieves have stolen a batch of PINs from a retailer—PINs the retailer shouldn't have stored in the first place:
Criminals have stolen bank account data from a third-party company, several banks have said, and then used the data to steal money from related accounts using counterfeit cards at ATM machines.
The central question surrounding the new wave of crime is this: How did the thieves managed to foil the PIN code system designed to fend off such crimes? Investigators are considering the possibility that criminals have stolen PIN codes from a retailer, MSNBC has learned.
In recent weeks, Bank of America, Wells Fargo, Washington Mutual and Citibank have all reissued debit cards after detecting fraudulent activity. Smaller banks, such as Ohio-based National City Bank and Pennsylvania-based PNC Bank, have taken similar steps.
Bruce Schneier reported on this Monday, but now the scope of the crime is becoming more apparent.
So how did the thieves get the customers' PINs? It appears that a retailer stored them along with other credit-card data in its database, and the thieves stole the database:
[Gartner analyst Avivah Litan] says many merchants incorrectly store PIN information they should be destroying after customers enter the secret code on PIN pads in stores around the country. While the information is often encrypted into something called a PIN block, the keys necessary to decrypt the information are often stored on the same network, she said. That makes stealing the PINs as easy as breaking into an office computer using a password a careless employee has taped to the screen.
The thing is, the retailers have no need to store the PINs:
While storing PINs is against network rules, many retailers inadvertently store the information, said Mike Urban, who runs Fair Isaac Inc.'s ATM fraud detection program called CardAlert. It ends up accidentally saved in temporary files and other software nooks and crannies.
ZDNet has this story too.
The solution to this problem, long known to concientious software developers, is never to keep secrets unless they're absolutely necessary. I tell my clients all the time that neither I nor anyone else should ever know their passwords, for for example.
It will be interesting, and important to every consumer, to see how liability for this event is apportioned. Sadly, most courts and legislators are woefully ignorant of the technology, which should lead to some fascinating legal work in coming months.
Until this issue gets resolved, which could take weeks, I urge people to be very careful using point-of-sale debit card readers. And if you suspect unauthorized activity on your bank account, call your bank immediately.
Here's a hint: the problem is between chair and receiver.
Bruce Schneier linked today to this excellent essay on the unseen dangers of mobile phones:
About four seats away is a gentleman (on this occasion pronounced 'fool') with a BlackBerry mobile device and a very loud voice. He is obviously intent on selling a customer something and is briefing his team. It seems he is the leader as he defines the strategy and assigns each of his unseen team with specific tasks and roles.
Eventually, he starts to close down the conversation. Relief might be here at last! Oh no, he goes on to announce the conference number and the pass code - and say he will see them all on the conference call in a minute.
My colleague Cameron Beatley sent me this handy chart:
Quick Guide to Programming Languages
The proliferation of modern programming languages (all of which seem to have stolen countless features from one another) sometimes makes it difficult to remember what language you're currently using. This handy reference is offered as a public service to help programmers who find themselves in such a dilemma.
Shoot yourself in the foot.
- You shoot yourself in the foot.
- You accidentally create a dozen instances of yourself and shoot them all in the foot. Providing emergency medical assistance is impossible since you can't tell which are bitwise copies and which are just pointing at others and saying, "That's me, over there."
- You shoot yourself in each toe, iteratively, until you run out of toes, then you read in the next foot and repeat. If you run out of bullets, you continue with the attempts to shoot yourself anyways because you have no exception-handling capability.
- The compiler won't let you shoot yourself in the foot.
- After correctly packing your foot, you attempt to concurrently load the gun, pull the trigger, scream, and shoot yourself in the foot. When you try, however, you discover you can't because your foot is of the wrong type.
- Using a COLT 45 HANDGUN, AIM gun at LEG.FOOT, THEN place ARM.HAND.FINGER on HANDGUN.TRIGGER and SQUEEZE. THEN return HANDGUN to HOLSTER. CHECK whether shoelace needs to be re-tied.
- You shoot yourself in the appendage which holds the gun with which you shoot yourself in the appendage which holds the gun with which you shoot yourself in the appendage which holds the gun with which you shoot yourself in the appendage which holds the gun with which you shoot yourself in the appendage which holds the gun with which you shoot yourself in the appendage which holds...
- Foot in yourself shoot.
- You tell your program that you want to be shot in the foot. The program figures out how to do it, but the syntax doesn't permit it to explain it to you.
- Shoot yourself in the foot with a water pistol. On large systems, continue until entire lower body is waterlogged.
- Visual Basic
- You'll really only appear to have shot yourself in the foot, but you'll have had so much fun doing it that you won't care.
- Put the first bullet of gun into foot left of leg of you. Answer the result.
- You spend days writing a UIL description of your foot, the bullet, its trajectory, and the intricate scrollwork on the ivory handles of the gun. When you finally get around to pulling the trigger, the gun jams.
- You shoot yourself in the foot, then spend all day figuring out how to do it in fewer characters.
- If you succeed, shoot yourself in the left foot. If you fail, shoot yourself in the right foot.
foot.c foot.h foot.o toe.c toe.o
% rm * .o
rm:.o no such file or directory
- Concurrent Euclid
- You shoot yourself in somebody else's foot.
- 370 JCL
- You send your foot down to MIS and include a 400-page document explaining exactly how you want it to be shot. Three years later, your foot comes back deep-fried.
- Not only can you shoot yourself in the foot, your users can, too.
- You try to point the gun at your foot, but it shoots holes in all your Borland distribution diskettes instead.
- You're sure you're going to be able to shoot yourself in the foot, just as soon as you figure out what all these nifty little bullet-thingies are for.
- You try to shoot yourself in the foot, only to discover you must first invent the gun, the bullet, the trigger, and your foot.
- After realizing that you can't actually accomplish anything in this language, you shoot yourself in the head.
Ah, the Peter Principle rears its ugly head once again, in its purest form.
MSNBC is reporting that a Costa Mesa, Calif., middle school has suspended students for viewing a Web page. They're also trying to expel the student who put up the page (internal links mine):
A middle school student faces expulsion for allegedly posting graphic threats against a classmate on the popular myspace.com Web site, and 20 of his classmates were suspended for viewing the posting, school officials said.
Police are investigating the boy's comments about his classmate at TeWinkle Middle School as a possible hate crime, and the district is trying to expel him.
According to three parents of the suspended students, the invitation to join the boy's MySpace group gave no indication of the alleged threat. They said the MySpace social group name's was "I hate (girl's name)" and included an expletive and an anti-Semitic reference.
... "With what the students can get into using the technology we are all concerned about it," Bob Metz, the district assistant superintendent of secondary education, said Wednesday.
Putting aside the somewhat complicated question about whether or how the school district should discipline the page's author, what are they thinking disciplining the kids who just viewed the posting? One of two things seems to be happening here: either MSNBC's reporting is sloppy (e.g., the kids didn't just view the posting, they committed an affirmative act endorsing it), or Metz is just not a very smart man. (As one snarky friend once put it, he Can't Understand New Technology.)
I'm thinking, it's a little of both. This comes not too long after a kid got expelled for a doodle in McHenry, Ill. The similarity is that a kid is getting disciplined harshly for expressing something. Now, it seems like this could be a valuable "teachable moment" for the kids involved, but it also seems like expulsion won't teach them anything helpful.
What is it about school administrators? Getting tough on free speech isn't exactly an American value.