Create an Account
username: password:
 
  MemeStreams Logo

Curiouser and Curiouser

search

Acidus
Picture of Acidus
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Acidus's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
I am a hacker and you are afraid and that makes you more dangerous than I ever could be.

The Innovation Problem
Topic: Technology 2:50 am EST, Dec 28, 2008

A series of Paul Graham's articles has led me to something I'm calling the Innovation Problem. Essentially it started when I read his article After Credentials. I enjoyed it article, but found this part is odd:

Do they let energetic young people get paid market rate for the work they do? The young are the test, because when people aren't rewarded according to performance, they're invariably rewarded according to seniority instead.
...
If people who are young but smart and driven can make more by starting their own companies than by working for existing ones, the existing companies are forced to pay more to keep them.

This statement about motives seemed out of sync with his essay Great Hackers:

Great programmers are sometimes said to be indifferent to money. This isn't quite true. It is true that all they really care about is doing interesting work. But if you make enough money, you get to work on whatever you want, and for that reason hackers are attracted by the idea of making really large amounts of money. But as long as they still have to show up for work every day, they care more about what they do there than how much they get paid for it.

Perhaps this is because Graham is talking about a general case of person in the first essary and a subset of people (Specifically great programmers) in the second.

Now, I don't consider myself a super hacker and nor would I ever compare myself to someone like RTM or others Graham has mentioned. Quite the contrary I've gone out of my way to deny unwarranted comparisons. I do however consider myself a hacker and I understand exactly what Graham means in his 2nd essay.

I think that performance metrics are one half of a two sided coin, depending on what drives you are a person: pay or project.

Let me explain. I work for a Fortune 15 technology corporation. They pay me very, very, very well. However in return I'm subjected to (with a fair bit of good things) unbelievably stupid bullshit. They don't seem to realize that I couldn't give 2 shits about their money otherwise I'd have alot less bullshit in my life.

Jay Chaudhry met with me twice in the spring of 2008 and asked me to join his new start up Zscalar. I turned him down for a couple reasons, the biggest being he kept appealing to the wrong side of me. He kept talking dollars, he never talked projects. How are you doing "in the cloud" security. Are you buying or building? ... [ Read More (0.4k in body) ]


Penny Arcade! - Once More Unto The Breach
Topic: Miscellaneous 12:10 am EST, Dec 23, 2008

World War Z (BTW) is a little slice of excellence that if you are not reading it you are not living a full and healthy life.

Penny Arcade! - Once More Unto The Breach


Parsing Delimiters
Topic: Miscellaneous 11:52 pm EST, Dec 22, 2008

ARRRRRRRRRRRR! [Rages at specific website] Its supposed to be commas damn it! Then for some reason people get IIS to spit out semicolons. But how in gods name did you get it to use a semicolon to delimit between #1 and #2 but a comma between #2 and #3.

The web is a dirty dirty place (and I'm not talking about YouPorn). "Whats that sweetness? A vengeful rain will come and wash the streets clean?" I sure hope so.


VACATION!
Topic: Miscellaneous 4:11 pm EST, Dec 19, 2008

Hurray! No more work until Jan 5th!


MFSA 2008-45: Uninitialized memory reading
Topic: Miscellaneous 12:44 pm EST, Dec 19, 2008

I think this might be my first CVE.

MFSA 2008-45: Uninitialized memory reading


Jeremy Piven: Mercury poisoning, possible from excessive sushi
Topic: Miscellaneous 10:01 am EST, Dec 19, 2008

Dr. Colker said that an initial battery of tests on Mr. Piven had shown normal results. But after Mr. Piven said he was a frequent sushi eater who consumed fish about twice a day, and that he used herbal remedies, Dr. Colker tested him for heavy metals.

Dr. Colker said that these tests revealed “a very, very elevated level of mercury” in Mr. Piven’s blood, adding that it was five to six times the upper limit that is typically measured. Left untreated, Dr. Colker said, the condition could result in heart problems, cognitive problems, renal failure and, in very extreme cases, death. He said that he told Mr. Piven he could continue in the show, but only with extreme caution.

... ahhhh damn.

Jeremy Piven: Mercury poisoning, possible from excessive sushi


6 Myths About GM, Ford, and Chrysler
Topic: Current Events 9:54 am EST, Dec 19, 2008

I much enjoyed this article.

6 Myths About GM, Ford, and Chrysler


The year of risks in review
Topic: Miscellaneous 9:47 am EST, Dec 19, 2008

So with the Great Depression II: Greater and Furiouser™ approaching, this was a year of massive risk-taking. At every turn, we used chaos as an opportunity to take the nest egg and gamble it--but only after leveraging that nest egg with complicated derivatives that would famously come back to bore the crap out of us.

How crazy did we get? Our presidential election came down to a woman and a black guy, as if the presidency were no more important than those last two Supreme Court seats at the end of the bench. The Republicans picked their Vice President using the same criterion as guys in an Alaskan bar: by going for the only chick there. Sarah Palin got a $150,000 makeover when it was obvious to everyone outside the party that John McCain needed it more. As the year went on, people got even more entranced by risk, placing their roulette bets on green. Barack Obama picked Hillary Clinton as his Secretary of State. Heidi married Spencer. Coors got rid of Zima.

When Obama faced the Rev. Jeremiah Wright scandal, instead of denying or attacking, he led a serious discussion about race--something that has never worked after the first semester of sophomore year. Mitt Romney made a similarly brave gambit when posing with some black children on Martin Luther King Jr. Day and opening the dialogue by saying, "Who let the dogs out? Who! Who!" The nation's fastest-rising politician, Joe the Plumber, got his start with the gutsy decision to ask for a tax break that he didn't remotely qualify for. Even crazier, opponents of gay marriage in California bought ads claiming kids would be taught gayness in schools, when everyone knows kids don't get taught anything in California schools.

Governor Rod Blagojevich, already under suspicion for looking and dressing like a Serbian warlord, publicly dared people to wiretap him, insisting all they'd hear him discussing was what the Cubs should do in the off-season. Baseball things like taking government money in return for firing Chicago Tribune writers who hate him. When what the Cubs really need is a starting pitcher.

Danger-seeking was so popular that somehow pirates came back. Someone gave Don Imus a radio job. When investment banks crumbled, we decided to hand over $700 billion to Henry Paulson, who used to run an investment bank. It was the kind of year when a famous football player could think, Sure, I've drunk a lot and have a loaded gun in my pants, but the music in this club makes me want to put my hands in my pockets and dance!

Never before had non-French, non-soap-opera-character wife cheaters been so bold. After learning about the intricacies of prostitution rings by busting them, Eliot Spitzer sought out a girlfriend experience with a prostitute who is an aspiring singer with a MySpace account. He would have been more discreet making love to a screen live on CNN, as John King did. The mayor of Detroit communicated with his mistress by text-messaging, a form of com... [ Read More (0.2k in body) ]


Creating pseudo 3D games with HTML 5 canvas and raycasting
Topic: Miscellaneous 10:55 am EST, Dec 17, 2008

With the increase in browser performance in recent times it has become easier to implement games in JavaScript beyond simple games like Tic-Tac-Toe. We no longer need to use Flash to do cool effects and, with the advent of the HTML5 Canvas element, creating snazzy looking web games and dynamic graphics is easier than ever before. One game, or game engine, I wanted to implement for some time was a psuedo-3D engine such as the one used in the old Wolfenstein 3D game by iD Software. I went through two different approaches, first attempting to create a "regular" 3D engine using Canvas and later going for a raycasting approach using straight DOM techniques.

Very very sexy. Seems better than Canvascape. I think this is cooler than Wolf4K (Wolfenstein in 4K of JavaScript),

Creating pseudo 3D games with HTML 5 canvas and raycasting


Its not a 'Search.' Its just a search.
Topic: Miscellaneous 11:12 am EST, Dec 15, 2008

For some reason, the government did not appear to make the argument invited by the Supreme Court by its rulings in the FedEx and dog-sniff cases. The government could have argued that -- if the EnCase scan for a particular MD5 hash matches -- that the search is constitutionally permissible without a warrant because it revealed nothing except the existence of contraband. And, because there is no reasonable expectation of privacy in contraband, the government might argue, a search which only reveals the existence of contraband invades no legitimate privacy right.

In the Crist case, however, the court never addressed that critical issue, because it never had to. The government merely argued that an automated search was no search at all.

This unanswered question -- whether a scan of hash values looking for contraband is a permissible search -- is really the rub.

If the government may conduct warrantless searches as long as they only reveal the presence of contraband, then they could lawfully put automated sniffers on any computer, searching for the presence of files for which the MD5 hash matched that of contraband. While the software categorizing the files might be considered to be conducting a search -- and I think it is -- the contents of this search are not revealed unless the program believes it is contraband.

... ... How did I not see this earlier? Pretty sure this is the same guy writing about how data stored "in the cloud" can be legally searched without a warrant because you have involved a 3rd party who can consent to the search.

And don't think about kiddie porn. Think about the MPAA.

Its not a 'Search.' Its just a search.


(Last) Newer << 21 ++ 31 - 32 - 33 - 34 - 35 - 36 - 37 - 38 - 39 ++ 49 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0