Archive for February 15th, 2012
My complaints are about outright technical inaccuracies, and getting the man’s work wrong. The design process, the resulting products, the centrality of software — Isaacson simply misses the boat.
You could learn more about Steve Jobs’s work by reading Rob Walker’s 2003 New York Times Magazine piece than by reading Isaacson’s book, but even then we’re left wanting for the stories behind any of Apple’s products after the iPod. Isaacson’s book may well be the defining resource for Jobs’s personal life — his childhood, his youth, his eccentricities, cruelty, temper, and emotional outbursts. But as regards Jobs’s work, Isaacson leaves the reader profoundly and tragically misinformed.
[There’s another aspect of all this success. Using UNIX via Next as the basis for OS X was huge in that there was a sudden switch. For years developers looked down their noses at Macs. Whether with good reason ro not I’ll leave aside for now. But there was an explosion of developers buying MacBook Pros (think the titanium era) with OS X. Once they realized that all the favorite tools and utilities, consoles and compilers were there and easily accessible, they all tossed aside their hard to configure (at that time) Linux running on whatever laptop and got Macs. And while the total number might have been small, I feel that the mindshare thing had a significant impact which continues today. If you’re going to talk about Jobs’ work. That mindshare acquisition, which came with Next was huge. Another little known fact. The web was born on a Next computer. The guy who created the web as we know it did it on Next. Not a direct link, but only one degree of separation.]
Source: Daring Fireball
What I’m saying is that Jeremy Lin is a head-case in the positive sense: he’s broken through into a zone where his head is level and his emotions are positive. He believes in himself, and he believes in his team. He has the poise of a player who’s been a starter for ten years. The other players he makes look good include Bill Walker, Landry Fields, Jared Jeffries and Steve Novak, none of whom are big stars.
Can’t help loving it. The story is too good not to.
[It’s the most fun a Knicks fan has had since the Ewing/Starks years]
Source: Doc Searls Weblog
All these fake startups need us to let them have our personal data, the same way the mortgage arbitrageurs needed all those junk mortgages to bundle up into AAA securities. The companies the VCs are starting now are garbage too. The kids who are jumping out of college to get rich are screwing themselves. And the universities that are shoveling their kids out of the door, some even saying openly they want to make money off the next Zuck or Gates, a lot of them are going to go the way of Lehman Brothers. And I don’t think there’s going to be much in the way of bailouts coming for them.
All you need for a bubble is a steady stream of suckers.
It’s all connected. The fact that they’re pushing our data up into the cloud is just one more facet of it. You can be sure they’re not being squeaky clean about what they do with this data. If you think ethics are big in boardrooms in Silicon Valley, you have yourself to blame because the facts that say otherwise are staring you in the face.
Source: Scripting News
Yes, the price is $4.95, but nonetheless, a long-lasting, efficient LED bulb for $4.95 is a win! The announcement was just made a few minutes ago, as Lemnis unveiled three new lines of its Pharox LED replacement bulb. The 200-lumen Pharox BLU is the bulb selling for $4.95, and the 350-lumen PHarox Blu is selling for $6.95. They are, apparently, only sold through the Pharox website.
[That’s a small step. More please.]
An astonishing four out of every 1,000 public keys protecting webmail, online banking, and other sensitive online services provide no cryptographic security, a team of mathematicians has found. The research is the latest to reveal limitations in the tech used by more than a million Internet sites to prevent eavesdropping.
The finding, reported in a paper (PDF) to be presented at a cryptography conference in August, is based on the analysis of some 7.1 million 1024-bit RSA keys published online. By subjecting what’s known as the “modulus” of each public key to an algorithm first postulated more than 2,000 years ago by the Greek mathematician Euclid, the researchers looked for underlying factors that were used more than once. Almost 27,000 of the keys they examined were cryptographically worthless because one of the factors used to generate them was used by at least one other key.
“The fact is, if these numbers had the entropy that they were supposed to have, the probability of even one of these events happening in 7 million public keys would be vanishingly small,” James P. Hughes, an independent cryptographer who participated in the research, told Ars. “We thought that was rather startling.”