| |
Being "always on" is being always off, to something. |
|
Topic: Science |
6:44 am EDT, Apr 28, 2008 |
Hubble is all grown up now! Arp 148 is the staggering aftermath of an encounter between two galaxies, resulting in a ring-shaped galaxy and a long-tailed companion. The collision between the two parent galaxies produced a shockwave effect that first drew matter into the centre and then caused it to propagate outwards in a ring. The elongated companion perpendicular to the ring suggests that Arp 148 is a unique snapshot of an ongoing collision. Infrared observations reveal a strong obscuration region that appears as a dark dust lane across the nucleus in optical light. Arp 148 is nicknamed “Mayall’s object” and is located in the constellation of Ursa Major, the Great Bear, approximately 500 million light-years away. This interacting pair of galaxies is included in Arp’s catalogue of peculiar galaxies as number 148.
Click through to celebrate Hubble's 18th anniversary. Imagery from Hubble |
|
Interview with Donald Knuth |
|
|
Topic: Technology |
6:44 am EDT, Apr 28, 2008 |
Andrew Binstock and Donald Knuth converse on the success of open source, the problem with multicore architecture, the disappointing lack of interest in literate programming, the menace of reusable code, and that urban legend about winning a programming contest with a single compilation.
Interview with Donald Knuth |
|
Topic: Business |
6:44 am EDT, Apr 28, 2008 |
Rising populations. Skyrocketing commodity prices. Strains on natural resources. Is this our Malthusian moment?
The Age of Scarcity? |
|
In their own fanatical words |
|
|
Topic: War on Terrorism |
6:44 am EDT, Apr 28, 2008 |
It's not easy to remember that terrorists, too, are in politics, with all the insecurity and ambition that implies. Certainly that's true of the four famous Islamic killers, two of them dead, whose statements, distributed on the Web, fill Al Qaeda in Its Own Words (Harvard University Press), published this week. Their messages rally the troops and attempt to recruit new soldiers, but also read like the pleas of politicians for status within the loosely defined and always changing jihadist movement.
In their own fanatical words |
|
Green giants: Our love affair with trees |
|
|
Topic: Home and Garden |
6:44 am EDT, Apr 28, 2008 |
From mighty oaks to humble hazels, our sylvan treasures have never been more highly valued – or popular. As a record 10 million green-fingered Britons prepare to plant saplings, Michael McCarthy explores a root and branch revolution
Green giants: Our love affair with trees |
|
Two Minutes and 42 Seconds |
|
|
Topic: Arts |
6:44 am EDT, Apr 28, 2008 |
A muxtape. Anything else is just a waste of time.
Two Minutes and 42 Seconds |
|
Virginia Postrel, on Prattling |
|
|
Topic: Politics and Law |
6:44 am EDT, Apr 28, 2008 |
Virginia Postrel writing at Dynamist.com: It's infuriating how all three presidential candidates prattle on about the need to fight global warming while also complaining about the high price of gasoline. The candidates treat CO2 emissions as a social issue like gay marriage, with no economic ramifications. In the real world, barring a massive buildup of nuclear plants, reducing carbon dioxide emissions means consuming less energy and that means raising prices a lot, either directly with a tax or indirectly with a cap-and-trade permitting system. (Alternatively, the government could just ration energy, but fortunately we aren't going in that direction.) The last thing you'd want to do is reduce gas taxes during the summer, as John McCain has proposed. That would just encourage people to burn more gas on extra vacation trips – as any straight talker would admit.
Virginia Postrel, on Prattling |
|
Designing and implementing malicious hardware |
|
|
Topic: Technology |
6:44 am EDT, Apr 28, 2008 |
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defensive techniques. Yet current work on trojan circuits considers only simple attacks against the hardware itself, and straightforward defenses. More complex designs that attack the software are unexplored, as are the countermeasures an attacker may take to bypass proposed defenses. We present the design and implementation of Illinois Malicious Processors (IMPs). There is a substantial design space in malicious circuitry; we show that an attacker, rather than designing one specific attack, can instead design hardware to support attacks. Such flexible hardware allows powerful, general purpose attacks, while remaining surprisingly low in the amount of additional hardware. We show two such hardware designs, and implement them in a real system. Further, we show three powerful attacks using this hardware, including a login backdoor that gives an attacker complete and highlevel access to the machine. This login attack requires only 1341 additional gates: gates that can be used for other attacks as well. Malicious processors are more practical, more flexible, and harder to detect than an initial analysis would suggest.
Designing and implementing malicious hardware |
|
Local Area Personal Income, 2006 |
|
|
Topic: Local Information |
6:43 am EDT, Apr 28, 2008 |
Today, the Bureau of Economic Analysis (BEA) released estimates of personal income at the county level for 2006 based on newly available source data. Personal income is a comprehensive measure of the income of all persons from all sources. In addition to wages and salaries it includes employer–provided health insurance, dividends and interest income, social security benefits, and other types of income.
Local Area Personal Income, 2006 |
|
Set up Time Machine on a NAS in three easy steps |
|
|
Topic: High Tech Developments |
9:11 pm EDT, Apr 25, 2008 |
Here's a three-step process to create a Time Machine backup on a network-attached storage (NAS) unit.
Set up Time Machine on a NAS in three easy steps |
|