Create an Account
username: password:
 
  MemeStreams Logo

eltit

search

jlang
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

jlang's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
RE: RealClimate » Al Gore’s movie
Topic: Arts 12:01 am EDT, Jun 25, 2006

Decius wrote:
Furthmore, I was suprised to hear him praise Chineese cafe standards, as I recall watching a PBS program on Chineese environmentalism that argued that their standards were not directly comparable to American standards and claims that they had lower emmissions were disingenuous (I can't find a good link for that now).

The following is from NewScientist:

http://www.newscientist.com/article/mg19025574.000-kyoto-promises-are-nothing-but-hot-air.html

The most alarming failure of greenhouse gas emissions reporting is thought to have occurred in China, the world's second largest emitter. In the late 1990s, when its economy was growing by 10 per cent a year, the Chinese government reported a dramatic fall in CO2 emissions to the UN climate change convention. It declared that, after a long period of steep increases, emissions had fallen from 911 million tonnes of carbon a year in 1996 to 757 million tonnes in 2000, a drop of 17 per cent.

China said the fall in emissions was achieved by burning less coal, an assessment it based on a decline in coal production. Some analysts praised the country for using coal more efficiently, but that picture was called into doubt when declared coal production and emissions estimates resumed their fast rise. Estimates for 2004 put China's CO2 emissions above 1200 million tonnes.

Most analysts now conclude that the drop in emissions was entirely illusory. It coincided with major changes in the organisation of the Chinese coal industry, which replaced state targets with a market system. "Emissions figures before 1996 were inflated because mine officials had production targets to meet, and declared they had met them when they had not," one analyst told New Scientist. By 2000, this effect had gone, and "subsequent figures for CO2 emissions are probably more accurate as a result." While the Chinese government may not have intentionally misled the international community over its emissions at the time, the incident reveals how easy it could be to fiddle official figures.

RE: RealClimate » Al Gore’s movie


Special forces to use strap-on 'Batwings' | the Daily Mail
Topic: Miscellaneous 11:39 am EDT, Jun 14, 2006

Elite special forces troops being dropped behind enemy lines on covert missions are to ditch their traditional parachutes in favour of strap-on stealth wings.

The lightweight carbon fibre mono-wings will allow them to jump from high altitudes and then glide 120 miles or more before landing - making them almost impossible to spot, as their aircraft can avoid flying anywhere near the target.

Special forces to use strap-on 'Batwings' | the Daily Mail


Stratfor agrees that Al'Q is a scene. Calls it Al'Q 4.0.
Topic: Current Events 4:12 pm EDT, Jun  8, 2006

I do NOT plan to get in the habit of regularly reposting Stratfor's emails, but this one is extremely relevant to conversations we've been having on this site for a long time. (BTW, I'm not really sure if thats the first time that idea appeared here or if I'm really responsible for originating it. Its just the earliest link that I have. I think I was thinking that a long time before I said it. I said it when it became so obvious it seemed like review.)

Once again, let me start with one of the last sentances: Finally, the ability of grassroots cells to network across international boundaries, and even across oceans, presents the possibility that al Qaeda 4.0 cells could, now or in the future, pose a significant threat even without a central leadership structure -- meaning, a structure that can be identified, monitored and attacked

Stratfor: Terrorism Intelligence Report - June 7, 2006

Al Qaeda: The Next Phase of Evolution?

By Fred Burton

Canadian authorities recently arrested 17 men, accusing them of
planning terrorist attacks, after some members of the group bought
what they believed to be some 3 tons of ammonium nitrate
fertilizer, which can be used to make explosives. The men allegedly
were planning attacks against symbolic targets in Toronto and
Ottawa in a plot that reportedly included bombings, armed assaults
and beheadings.

One of the things that make this case interesting is that the group
-- now dubbed by the media as the "Canada 17" -- reportedly had
connections to alleged jihadists in other countries, whose earlier
arrests were widely reported. Those connections included two men
from the United States -- Ehsanul Islam Sadequee and Syed Haris
Ahmed -- who reportedly traveled from Georgia in March 2005 to meet
with Islamist extremists in Toronto. Authorities have said they
conspired to attend a militant training camp in Pakistan and
discussed potential terrorist targets in the United States. There
also is said to be a connection to a prominent computer hacker in
Britain, who was arrested in October and charged with conspiring to
commit murder and cause an explosion.

The June 2 arrests certainly underscore the possibility that
Canada , which has a long history of liberal immigration and asylum
policies, has been used by jihadists as a sanctuary for raising
funds and planning attacks. But the most intriguing aspect of the
Canada case is that it seems to encapsulate a trend that has been
slowly evolving for some time. If the allegations in the Canada 17
case are at least mostly true, it might represent the emergence of
a new operational model for jihadists -- an "al Qaeda 4.0," if you
will.

In other words, the world might be witnessing the emergence of a
grassroots jihadist network that both exists in and h... [ Read More (2.4k in body) ]

Stratfor agrees that Al'Q is a scene. Calls it Al'Q 4.0.


Giant Crater Found: Tied to Worst Mass Extinction Ever
Topic: Science 11:37 am EDT, Jun  2, 2006

An apparent crater as big as Ohio has been found in Antarctica. Scientists think it was carved by a space rock that caused the greatest mass extinction on Earth, 250 million years ago.

Giant Crater Found: Tied to Worst Mass Extinction Ever


Neanderthal yields nuclear DNA
Topic: Science 3:59 pm EDT, May 16, 2006

The first sequences of nuclear DNA to be taken from a Neanderthal have been reported at a US science meeting.

Neanderthal yields nuclear DNA


Kick Ass Kung Fu
Topic: Games 5:34 pm EDT, May  2, 2006

Kick Ass Kung Fu lets players fight onscreen enemies using real kicks, punches, head-butts or by wielding any improvised weapon they choose. A video camera captures their movements from one side and superimposes a two-dimensional silhouette of them onto a computer screen. A computer then translates the silhouette's moves into real-time computerised kicks and punches, enabling a player to take on virtual opponents.

Kick Ass Kung Fu


Google's sparse_hash_map implementation available under BSD license
Topic: Technology 9:37 am EDT, Apr 20, 2006

The Google SparseHash project contains several C++ template hash-map implementations in use at Google, with different performance characteristics, including an implementation that optimizes for space and one that optimizes for speed.

Google's sparse_hash_map implementation available under BSD license


InformationWeek | Security | The Fear Industry | April 17, 2006
Topic: Technology 4:12 pm EDT, Apr 17, 2006

In January, a vulnerability in WMF surfaced that let attackers use the Windows' graphics rendering engine that handles WMF images to launch malicious code on users' computers via these images. A number of security researchers posted information about the vulnerability to their mailing lists. Within a few hours, researcher H.D. Moore posted a working example of a WMF exploit--a piece of code written to take advantage of a software flaw--on his Metasploit Web site. Some defended the action, saying it offered insight into the rules security pros needed to put on intrusion-detection systems to avoid getting hit. Others argued that what Moore did enabled the average hacker to more easily exploit the flaw.

Information Week published a long, sensational, and patently dishonest article on security research today. This text makes it seem as if malware authors used the information H.D. Moore published. The fact is that this vulnerability was being exploited by criminal organizations in the wild before anyone in the security research community knew about it. The article fails to make this fact clear because it doesn't fit into the narrative that the reporter is aiming for and undermines the questions the reporter is raising. Would any major news media organization be interesting in a peice that discusses whether intentially dishonest reporting is good or bad for society?

InformationWeek | Security | The Fear Industry | April 17, 2006


Intelligence in the Civil War
Topic: Society 8:13 pm EST, Mar 15, 2006

Though much has been written about the Civil War itself, little has been written about the spy war that went on within.

Each side still used age-old intelligence techniques, such as code-breaking, deception, and covert surveillance. However, into this modern war came two innovations that would endure as tools of espionage: wiretapping and overhead reconnaissance.

What follows is a look at some of the highlights of how the North and the South gathered and used their information, the important missions, and the personalities. From this special view, the focus is not on the battlefield, but on a battle of wits.

Intelligence in the Civil War


Telecloning -- Anonymous eavesdropping on quantum cryptography
Topic: Science 8:12 pm EST, Mar 15, 2006

In ideal [quantum] teleportation, the original is destroyed and its exact properties are transmitted to a second, remote particle; the Heisenberg principle does not apply because no definitive measurements are made on the original particle. In telecloning, the original is destroyed, and its properties are sent to not one but two remote particles, with the original's properties reconstructed to a maximum accuracy (fidelity) of less than 100 percent. (The Heisenberg principle limits the ability to make clones as otherwise researchers could keep making copies of the original particle and learn everything about its state.)

[...]

In addition to representing a new quantum-information tool, telecloning may have an exotic application: tapping quantum cryptographic channels. Quantum cryptographic protocols are so secure that they may discover tapping. Nonetheless, with telecloning, the identity and location of the eavesdropper could be guaranteed uncompromised.

Telecloning -- Anonymous eavesdropping on quantum cryptography


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0