| |
|
RE: RealClimate » Al Gore’s movie |
|
|
Topic: Arts |
12:01 am EDT, Jun 25, 2006 |
Decius wrote: Furthmore, I was suprised to hear him praise Chineese cafe standards, as I recall watching a PBS program on Chineese environmentalism that argued that their standards were not directly comparable to American standards and claims that they had lower emmissions were disingenuous (I can't find a good link for that now).
The following is from NewScientist: http://www.newscientist.com/article/mg19025574.000-kyoto-promises-are-nothing-but-hot-air.html The most alarming failure of greenhouse gas emissions reporting is thought to have occurred in China, the world's second largest emitter. In the late 1990s, when its economy was growing by 10 per cent a year, the Chinese government reported a dramatic fall in CO2 emissions to the UN climate change convention. It declared that, after a long period of steep increases, emissions had fallen from 911 million tonnes of carbon a year in 1996 to 757 million tonnes in 2000, a drop of 17 per cent. China said the fall in emissions was achieved by burning less coal, an assessment it based on a decline in coal production. Some analysts praised the country for using coal more efficiently, but that picture was called into doubt when declared coal production and emissions estimates resumed their fast rise. Estimates for 2004 put China's CO2 emissions above 1200 million tonnes. Most analysts now conclude that the drop in emissions was entirely illusory. It coincided with major changes in the organisation of the Chinese coal industry, which replaced state targets with a market system. "Emissions figures before 1996 were inflated because mine officials had production targets to meet, and declared they had met them when they had not," one analyst told New Scientist. By 2000, this effect had gone, and "subsequent figures for CO2 emissions are probably more accurate as a result." While the Chinese government may not have intentionally misled the international community over its emissions at the time, the incident reveals how easy it could be to fiddle official figures.
RE: RealClimate » Al Gore’s movie |
|
Special forces to use strap-on 'Batwings' | the Daily Mail |
|
|
Topic: Miscellaneous |
11:39 am EDT, Jun 14, 2006 |
Elite special forces troops being dropped behind enemy lines on covert missions are to ditch their traditional parachutes in favour of strap-on stealth wings. The lightweight carbon fibre mono-wings will allow them to jump from high altitudes and then glide 120 miles or more before landing - making them almost impossible to spot, as their aircraft can avoid flying anywhere near the target.
Special forces to use strap-on 'Batwings' | the Daily Mail |
|
Stratfor agrees that Al'Q is a scene. Calls it Al'Q 4.0. |
|
|
Topic: Current Events |
4:12 pm EDT, Jun 8, 2006 |
I do NOT plan to get in the habit of regularly reposting Stratfor's emails, but this one is extremely relevant to conversations we've been having on this site for a long time. (BTW, I'm not really sure if thats the first time that idea appeared here or if I'm really responsible for originating it. Its just the earliest link that I have. I think I was thinking that a long time before I said it. I said it when it became so obvious it seemed like review.) Once again, let me start with one of the last sentances: Finally, the ability of grassroots cells to network across international boundaries, and even across oceans, presents the possibility that al Qaeda 4.0 cells could, now or in the future, pose a significant threat even without a central leadership structure -- meaning, a structure that can be identified, monitored and attacked Stratfor: Terrorism Intelligence Report - June 7, 2006 Al Qaeda: The Next Phase of Evolution? By Fred Burton Canadian authorities recently arrested 17 men, accusing them of planning terrorist attacks, after some members of the group bought what they believed to be some 3 tons of ammonium nitrate fertilizer, which can be used to make explosives. The men allegedly were planning attacks against symbolic targets in Toronto and Ottawa in a plot that reportedly included bombings, armed assaults and beheadings. One of the things that make this case interesting is that the group -- now dubbed by the media as the "Canada 17" -- reportedly had connections to alleged jihadists in other countries, whose earlier arrests were widely reported. Those connections included two men from the United States -- Ehsanul Islam Sadequee and Syed Haris Ahmed -- who reportedly traveled from Georgia in March 2005 to meet with Islamist extremists in Toronto. Authorities have said they conspired to attend a militant training camp in Pakistan and discussed potential terrorist targets in the United States. There also is said to be a connection to a prominent computer hacker in Britain, who was arrested in October and charged with conspiring to commit murder and cause an explosion. The June 2 arrests certainly underscore the possibility that Canada , which has a long history of liberal immigration and asylum policies, has been used by jihadists as a sanctuary for raising funds and planning attacks. But the most intriguing aspect of the Canada case is that it seems to encapsulate a trend that has been slowly evolving for some time. If the allegations in the Canada 17 case are at least mostly true, it might represent the emergence of a new operational model for jihadists -- an "al Qaeda 4.0," if you will. In other words, the world might be witnessing the emergence of a grassroots jihadist network that both exists in and h... [ Read More (2.4k in body) ] Stratfor agrees that Al'Q is a scene. Calls it Al'Q 4.0. |
|
Giant Crater Found: Tied to Worst Mass Extinction Ever |
|
|
Topic: Science |
11:37 am EDT, Jun 2, 2006 |
An apparent crater as big as Ohio has been found in Antarctica. Scientists think it was carved by a space rock that caused the greatest mass extinction on Earth, 250 million years ago. Giant Crater Found: Tied to Worst Mass Extinction Ever |
|
Neanderthal yields nuclear DNA |
|
|
Topic: Science |
3:59 pm EDT, May 16, 2006 |
The first sequences of nuclear DNA to be taken from a Neanderthal have been reported at a US science meeting. Neanderthal yields nuclear DNA |
|
Topic: Games |
5:34 pm EDT, May 2, 2006 |
Kick Ass Kung Fu lets players fight onscreen enemies using real kicks, punches, head-butts or by wielding any improvised weapon they choose. A video camera captures their movements from one side and superimposes a two-dimensional silhouette of them onto a computer screen. A computer then translates the silhouette's moves into real-time computerised kicks and punches, enabling a player to take on virtual opponents. Kick Ass Kung Fu |
|
Google's sparse_hash_map implementation available under BSD license |
|
|
Topic: Technology |
9:37 am EDT, Apr 20, 2006 |
The Google SparseHash project contains several C++ template hash-map implementations in use at Google, with different performance characteristics, including an implementation that optimizes for space and one that optimizes for speed. Google's sparse_hash_map implementation available under BSD license |
|
InformationWeek | Security | The Fear Industry | April 17, 2006 |
|
|
Topic: Technology |
4:12 pm EDT, Apr 17, 2006 |
In January, a vulnerability in WMF surfaced that let attackers use the Windows' graphics rendering engine that handles WMF images to launch malicious code on users' computers via these images. A number of security researchers posted information about the vulnerability to their mailing lists. Within a few hours, researcher H.D. Moore posted a working example of a WMF exploit--a piece of code written to take advantage of a software flaw--on his Metasploit Web site. Some defended the action, saying it offered insight into the rules security pros needed to put on intrusion-detection systems to avoid getting hit. Others argued that what Moore did enabled the average hacker to more easily exploit the flaw.
Information Week published a long, sensational, and patently dishonest article on security research today. This text makes it seem as if malware authors used the information H.D. Moore published. The fact is that this vulnerability was being exploited by criminal organizations in the wild before anyone in the security research community knew about it. The article fails to make this fact clear because it doesn't fit into the narrative that the reporter is aiming for and undermines the questions the reporter is raising. Would any major news media organization be interesting in a peice that discusses whether intentially dishonest reporting is good or bad for society? InformationWeek | Security | The Fear Industry | April 17, 2006 |
|
Intelligence in the Civil War |
|
|
Topic: Society |
8:13 pm EST, Mar 15, 2006 |
Though much has been written about the Civil War itself, little has been written about the spy war that went on within. Each side still used age-old intelligence techniques, such as code-breaking, deception, and covert surveillance. However, into this modern war came two innovations that would endure as tools of espionage: wiretapping and overhead reconnaissance. What follows is a look at some of the highlights of how the North and the South gathered and used their information, the important missions, and the personalities. From this special view, the focus is not on the battlefield, but on a battle of wits.
Intelligence in the Civil War |
|
Telecloning -- Anonymous eavesdropping on quantum cryptography |
|
|
Topic: Science |
8:12 pm EST, Mar 15, 2006 |
In ideal [quantum] teleportation, the original is destroyed and its exact properties are transmitted to a second, remote particle; the Heisenberg principle does not apply because no definitive measurements are made on the original particle. In telecloning, the original is destroyed, and its properties are sent to not one but two remote particles, with the original's properties reconstructed to a maximum accuracy (fidelity) of less than 100 percent. (The Heisenberg principle limits the ability to make clones as otherwise researchers could keep making copies of the original particle and learn everything about its state.) [...] In addition to representing a new quantum-information tool, telecloning may have an exotic application: tapping quantum cryptographic channels. Quantum cryptographic protocols are so secure that they may discover tapping. Nonetheless, with telecloning, the identity and location of the eavesdropper could be guaranteed uncompromised. Telecloning -- Anonymous eavesdropping on quantum cryptography |
|