pipeline
How P.E. and Guerilla Funk is keepin it movin
For the second time ever, astronomers have detected a pattern in a mysterious fast radio burst coming from space. […] earlier this year when astronomers found that FRB 180916.J0158+65 had a pattern in bursts occurring every 16.35 days. Over the course of four days, the signal would release a burst or two each hour. Then, it would go silent for another 12 days.
Now, they have detected a pattern in a second repeating fast radio burst, known as FRB 121102. During this cyclical pattern, radio bursts are emitted during a 90-day window, followed by a silent period of 67 days. This pattern repeats every 157 days.
the dick pics you’ve been waiting for
{ Huntington Beach, California, May 13, 2020 | more gloomy photos }
{Huntington Beach, California }
{ amazon.com | Related: Mrs. Trump had chosen some furniture for the White House residence […] in her absence, President Trump — whose tastes veer toward the gilded, triumphal style of Louis XIV — replaced her choices with several pieces he liked better. One of two people familiar with the episode cited it as an example of Mr. Trump’s tendency not to relent on even the smallest requests from his wife. | NY Times }
every three weeks Biden exits the basement, tells people not to vote for him, and disappears again
“Attitudes are more important than facts,” Peale preached.
“Formulate and stamp indelibly on your mind a mental picture of yourself as succeeding,” Peale writes in “The Power of Positive Thinking.”
“Hold this picture tenaciously. Never permit it to fade.”
[…]
Paula White, a televangelist, belongs to the Word of Faith movement, which teaches that God bestows health and wealth on true believers.
In a Rose Garden ceremony for the National Day of Prayer earlier this month, White quoted from the Bible’s Book of Job: “If you decree and declare a thing, it will be established.”
“I declare no more delays to the deliverance of Covid-19,” White continued. “No more delays to healing and a vaccination.”
‘Anything can happen, but it usually doesn’t.’ —Robert Benchley
The Navy records, known as “hazard reports,” describe both visual and radar sightings, including close calls with the aerial vehicles, or “unmanned aircraft systems.”
One incident, on March 26, 2014, over the Atlantic Ocean off Virginia Beach, involved a silver object “approximately the size of a suitcase” that was tracked on radar passing within 1,000 feet of one of the jets, according to the report. […]
Defense Department officials do not describe the objects as extraterrestrial, and experts emphasize that earthly explanations can generally be found for such incidents. Even lacking a plausible terrestrial explanation does not make an extraterrestrial one likely, astrophysicists say.
{ NY Times | Continue reading }
I contacted Alexander Wendt, a professor of international relations at Ohio State University. Wendt is a giant in his field of IR theory, but in the past 15 years or so, he’s become an amateur ufologist. […] “It’s possible they’ve been here all along. And that’s something that I’ve been thinking about lately, which is a bit unsettling. Because it means it’s their planet and not ours. They could just be intergalactic tourists. Maybe they’re looking for certain minerals. It could just be scientific curiosity. It could be that they’re extracting our DNA. I mean, who knows? I have no idea. All I know is that if they are here, they seem to be peaceful. […] I think if they are here, they’ve probably been here a very long time — that’s my guess. ”
Regarding UFOs, I see three key explanation categories:
Measurement Error – What look like artificial objects with crazy extreme abilities are actually natural stuff looked at wrong. This is widely and probably correctly judged to be the most likely scenario. Nevertheless, we can’t be very confident of that without considering its alternatives in more detail.
Secret Societies – There really are artificial objects with amazing abilities, though abilities may be somewhat overestimated via partially misleading observations. These are created and managed by hidden groups in our world, substantially tied to us. Secret local military research groups, distant secret militaries, non-state Bond-villain-like groups, time-travelers from our near future, dinosaur civilizations hidden deep in the Earth’s crust, etc.
Aliens – Again these objects really do have amazing abilities, and are created by hidden groups. But in this case the relevant groups are much less integrated with and correlated with our societies and history. Little green men, their super-robot descendants, simulation admins, gods, etc. If these groups had a common origin with, competed with, or were much influenced by the groups that we know of, those things mostly happened long ago, and probably far away.
photo {Ansel Adams, The Golden Gate, San Francisco, c. 1950 }
Prepare for self-quarantine
Most estimates suggest 80% of COVID-19 cases are mild and feel roughly like a flu. Estimates I have seen suggest that roughly 10-15% of cases will be more significant and may necessitate hospital visits (see also) with 1-3% potentially needing an ICU. The concern of many governments is the peak number of cases that occur in a given moment. […]
The reported death rate has hovered around 2% but may in reality be 0.2% to 1% depending on country and healthcare system. Many estimates tend to indicate an overall expected mortality rate of ~0.5% globally. The current existing fatality rate is biased upwards by Wuhan cases dominating the mix (which are closer to a 3-4% death rate and make up most cases). It is possible the virus is being undertested for in China / rest of world driving the real death rate down (as many more people are infected than is reported). […]
R0 value: The spread rate of the virus seems to be well over 2 and likely ~3. This means for every person infected at least 2 to 3 more get the disease.
{ EladGil | Continue reading }
Experts think there may be many people with no symptoms at all, or such mild ones that they never bother to seek medical attention. Because those cases have not been counted, it’s not possible now to know the real proportion of mild versus severe cases. […]
After viral infections, people generally develop antibodies in their blood that will fight off the virus and protect them from contracting it again. It’s reasonable to assume that people who have had the new coronavirus will become immune to it.
But it is not known how long that immunity will last. With other coronaviruses, which cause the common cold, immunity can wane.
{ NY Times | Continue reading }
The best estimates so far suggest that Covid-19 kills about 1% of people it infects. That number may go up somewhat or fall significantly; either way it could add up to a dreadful toll.
If 60% of the world’s population is ultimately infected, as suggested by Gabriel Leung, chair of public health medicine at Hong Kong University, a 1% fatality rate would kill almost 50 million people — similar to the 1918 Spanish flu. If that falls to 0.1%, it could still be roughly 10 times more fatal than the 2009 H1N1 influenza outbreak, which killed several hundred thousand in its first year. […]
The most severe period of initial infection could soon be fading. Respiratory diseases flourish in the cold season and taper off as the weather warms up. That should cause infection rates to slow in the northern hemisphere, while continuing at a lower level in tropical regions and spiking in temperate parts of the southern hemisphere where winter will be setting in. When a new year rolls around, the bulk of the disease will shift back to the northern hemisphere, to begin the cycle again.
Subsequent Covid-19 seasons probably won’t be as serious. Those who survive viruses should be immune from reinfection (though there have been reports of people being diagnosed with Covid-19 for a second time), and as the share of survivors in the population rises, it gets harder for a disease to spread. […]
In a best-case scenario, it’s even possible that vaccines may be available in not much more than a year.
{ Bloomberg | Continue reading }
The only path to flattening the curve for COVID-19 is community-wide isolation: the more people stay home, the fewer people will catch the disease. The fewer people who catch the disease, the better hospitals can help those who do. […]
Get a flu shot, if you haven’t already, and stock up supplies at home so that you can stay home for two or three weeks, going out as little as possible. […] Here’s a handy, one-page guide on what you need.
related { CoronaCoin: crypto developers seize on coronavirus for new, morbid token }
The trick is, you use the truth when you wanna tell a lie
{ Thanks Thomas! }
the ffrinch that fire on the Bull that bang
Two programmer-musicians wrote every possible MIDI melody in existence to a hard drive, copyrighted the whole thing, and then released it all to the public in an attempt to stop musicians from getting sued. […]
Riehl and Rubin developed an algorithm that recorded every possible 8-note, 12-beat melody combo. This used the same basic tactic some hackers use to guess passwords: Churning through every possible combination of notes until none remained. Riehl says this algorithm works at a rate of 300,000 melodies per second.
Once a work is committed to a tangible format, it’s considered copyrighted. And in MIDI format, notes are just numbers.
“Under copyright law, numbers are facts, and under copyright law, facts either have thin copyright, almost no copyright, or no copyright at all,” Riehl explained in the talk. “So maybe if these numbers have existed since the beginning of time and we’re just plucking them out, maybe melodies are just math, which is just facts, which is not copyrightable.”
All of the melodies they’ve generated, as well as the code for the algorithm that generated them, are available as open-source materials on Github and the datasets are on Internet Archive.
Closet for Repeers. 60 Shellburn. Key at Kate’s.
Americans spend an average 2.5 days per year searching for lost items and $2.7 billion a year replacing them. […]
Although 40% of Americans believe getting older causes them to forget where they place their valuables and household items, Millennials are generally twice as likely to misplace items over Boomers and a third more likely to lose items compared to Generation X.
Arms apeal with larms
The madman theory is a political theory commonly associated with U.S. President Richard Nixon’s foreign policy. He and his administration tried to make the leaders of hostile Communist Bloc nations think Nixon was irrational and volatile. According to the theory, those leaders would then avoid provoking the United States, fearing an unpredictable American response.
{ Wikipedia | Continue reading }
The author finds that perceived madness is harmful to general deterrence and is sometimes also harmful in crisis bargaining, but may be helpful in crisis bargaining under certain conditions.
black smoke shells fitted with computer chips { Cai Guo-Qiang, Wreath (Black Ceremony), 2011 }
This is Rooshious balls. This is a ttrinch. This is mistletropes. This is Canon Futter with the popynose.
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.
The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.
The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.
But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. […]
“It was the intelligence coup of the century,” the CIA report concludes. […]
The program had limits. America’s main adversaries, including the Soviet Union and China, were never Crypto customers.
related { How Big Companies Spy on Your Emails }
Like Pate-by-the-Neva or Pete-over-Meer
When privately owned land vanishes under the water, who does it belong to?
The problem is a result of the state’s rapidly changing landscape. About 80 percent of Louisiana’s coast is privately owned. But, under an old law, as coastal erosion and sea level rise turn the land into open water the area becomes property of the state, including the mineral rights underneath.
Private landowners have become more adamant about restricting access to water on their property in order to assert their claim to the minerals underneath it. But boaters often have difficulty figuring out where private property ends and public waterways begin. Since 2003, Louisiana law does not require landowners to post signs demarcating their property. The resulting confusion led the Bass Anglers Sportsman Society, or BASS, to announce in 2017 that it would no longer host professional fishing tournaments in Louisiana tidal waters, where fishers risk being arrested.
{ Scott Kelly and Ben Polkinghorne, Signs of the Times, 2017 }
Everywhere erriff you went and every bung you arver dropped into, in cit or suburb or in addled areas, the Rose and Bottle or Phoenix Tavern or Power’s Inn or Jude’s Hotel or wherever you scoured the countryside from Nannywater to Vartryville or from Porta Lateen to the lootin quarter
On Monday, the Justice Department announced that it was charging four members of China’s People’s Liberation Army with the 2017 Equifax breach that resulted in the theft of personal data of about 145 million Americans.
Using the personal data of millions of Americans against their will is certainly alarming. But what’s the difference between the Chinese government stealing all that information and a data broker amassing it legally without user consent and selling it on the open market? Both are predatory practices to invade privacy for insights and strategic leverage. […]
Equifax is eager to play the hapless victim in all this. […] “The attack on Equifax was an attack on U.S. consumers as well as the United States,” [Equifax’s chief executive] said. […]
According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.
Though the attack was quite sophisticated — the hackers sneaked out information in small, hard to detect chunks and routed internet traffic through 34 servers in over a dozen countries to cover their tracks — Equifax’s apparent carelessness made it a perfect target.
According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.
The takeaway: While almost anything digital is at some risk of being hacked, the Equifax attack was largely preventable.
related { The End of Privacy as We Know It? }
related { The FBI downloaded CIA’s hacking tools using Starbuck’s WiFi }
ills and ells with loffs of toffs and pleures of bells
With about a dozen trucks an hour setting off from the avocado belt in Mexico’s western state of Michoacán for the U.S., armed robbers are zeroing in on the fast-growing, multibillion-dollar industry. The rise in avocado-related crime has turned parts of the state into no-go areas even for the police. […]
Until recently, Mexico’s organized crime groups’ main source of revenues from avocados centred around extortion — demands for protection money from farmers. But the sharp fall in the price of Mexican opium paste has forced them to diversify, according to analysts.
Increasingly they have started hijacking truckloads of fruit for export. […] The rise in avocado crime is thus indirectly linked to America’s opioid crisis. Americans’ increased use of fentanyl, a synthetic opioid used for pain relief, pushed down the price of heroin, which in turn slashed the price of Mexican opium. […]
Demand for avocados jumps ahead of the Super Bowl, America’s biggest sporting event, with Mexico shipping a record 127,000 tonnes to the U.S. for the occasion. Overall production is rising, hitting 1.09 million tonnes in the 2018-19 season, up nearly 4 per cent from the 1.05 million produced in 2017-18. Exports last season rose 5.4 per cent. Sales to the U.S., the largest importer of Mexican avocados, bring in almost US$2 billion a year, much of it going to smallholders.
Axe on thwacks on thracks, axenwise. One by one place.
Several delivery services, including Postmates, Seamless, Grubhub, and DoorDash, offer food from restaurants without their explicit permission. The delivery apps pull up restaurant menus listed online, from which customers make their selections, and couriers working for the apps place orders on their behalf. The process essentially inserts third-party apps as middlemen into a service many restaurants say they want control over, or wish to opt out of entirely.
The Mookse had a sound eyes right but he could not all hear
Now we learn that San Diego City Attorney Mara Elliott gave the approval to General Electric to outfit 4,000 new “smart street lights” with cameras and microphones in 2017. […]
The City paid $30 million for the contract. But the larger issue is that General Electric has already made more than $1 billion dollars selling San Diego residents’ data to Wall Street.
The City of San Diego gave what appears to be unrestricted rights to the private data, according to the contract. […]
San Diego is now home to the largest mass surveillance operation across the country.
General Electric and its subsidiaries* have access to all the processed data in perpetuity with no oversight.
photo { Brad Rimmer }
Plato’s Republic though was hardly ever referenced by classical Latin authors like Juvenal, and it has been noted that it simply disappeared from literary awareness for a thousand years except for traces in the writings of Cicero and St. Augustine.
Old emails, photos and files from years past sit undisturbed, awaiting a search […] The problem is that all those messages require energy to preserve them. […]
Right now, data centers consume about 2 percent of the world’s electricity, but that is expected to reach 8 percent by 2030. Moreover, only about 6 percent of all data ever created is in active use today, according to research from Hewlett Packard Enterprise. That means 94 percent is sitting in a vast “landfill” with a massive carbon footprint.
“It’s costing us the equivalent of maintaining the airline industry for data we don’t even use”