Earlier this week, we learned that there is (most likely) at least one planet orbiting the star Alpha Centauri B. If you want to get really in-depth on this discovery, how it was made, and what it means, you should be reading Paul Gilster's Centauri Dreams blog.
I wanted to highlight this image, specifically, in order to quote some particularly evocative writing that Gilster posted yesterday. Cue the stirring music:
Read the rest
When planet-hunter Greg Laughlin (UC-Santa Cruz) took his turn at the recent press conference announcing the Alpha Centauri B findings, he used the occasion to make a unique visual comparison. One image showed the planet Saturn over the limb of the Moon. Think of this as the Galilean baseline, for when Galileo went to work on the heavens with his first telescope, the Moon was visually close at hand and Saturn a mysterious, blurry object with apparent side-lobes.
Laughlin contrasted that with [this image], showing the Alpha Centauri stars as viewed from Saturn, a spectacular vista including the planet and the tantalizing stellar neighbors beyond. Four hundred years after Galileo, we thus define what we can do — a probe of Saturn — and we have the image of a much more distant destination we’d like to know a lot more about. The findings of the Geneva team take us a giant step in that direction, revealing a small world of roughly Earth mass in a tight three-day orbit around a star a little smaller and a little more orange than the Sun.
New York's Grand Central Terminal, as it currently stands today, was built between 1903 and 1913. But it is the third Grand Central. Two earlier buildings — one called Grand Central Depot, and the other known as Grand Central Station (which remains the colloquial name for the Terminal) — existed on pretty much the exact same spot. But neither lasted nearly as long. The Depot opened in 1871, and was drastically reconstructed in 1899. The new building, the Station, only stood for three years before it began to come down in sections, eventually replaced by the current building.
That's a lot of structural shuffling, and at the Anthropology in Practice blog, Krystal D'Costa explains some of the history behind it. Turns out, the rapid reconfiguration of Grand Central had a lot to do with crowd control — figuring out how to use architecture to make the unruly masses a little more ruly. One early account that D'Costa quotes describes regular mad scrambles to board the train — intimidating altercations that could leave less-aggressive passengers stranded on the platform as their train left them behind.
Read the rest
The problem it seemed was that the interior of the depot did nothing to manage the Crowd—which could resume the same patterns of movement as they did on the street—and believe me, it was just as unruly out there. In the depot, where passengers were confronted with the unbridled power of locomotives, it was necessary to impose some sort of structure to the meeting: the Crowd had to be domesticated.
If you are going to be in New York this weekend, I'll be giving the keynote talk at 10 am on Saturday at the WFMU Radiovision 2012 Conference. I'm going to be talking about maker culture, Boing Boing, MAKE magazine, and the future of DIY. I'm really looking forward to meeting the other attendees!
WFMU presents a full day of presentations and panel discussions about radio's future as it takes on new forms in the digital age. Featuring Boing Boing's Mark Frauenfelder, Radio ARTE's Silvain Gire, Roman Mars, The Swedish Pirate Party, Pejk Malinovski, Francesca Panetta, Tim Pool, Maria Popova, Glynn Washington and many more.Admission prices: $80 General Admission and a discounted rate of $40 for artists, students. Both include lunch.
In a presentation at the BreakPoint security conference in Melbourne, IOActive researcher Barnaby Jack described an attack on pacemakers that could, he says, deliver lethal shocks to their owners. Jack claims that an unspecified pacemaker vendor's devices have a secret wireless back-door that can be activated by knowledgeable attackers from up to 30 feet away, and that this facility can be used to kill the victim right away, or to reprogram pacemakers to broadcast malicious firmware updates as their owners move around, which cause them to also spread the firmware, until they fail at a later time. Darren Pauli from Secure Business Intelligence quotes Jack as saying,
“The worst case scenario that I can think of, which is 100 percent possible with these devices, would be to load a compromised firmware update onto a programmer and … the compromised programmer would then infect the next pacemaker or ICD and then each would subsequently infect all others in range,” Jack said.
He was developing a graphical adminstration platform dubbed “Electric Feel” which could scan for medical devices in range and with no more than a right-click, could enable shocking of the device, and reading and writing firmware and patient data.
“With a max voltage of 830 volts, it's not hard to see why this is a fairly deadly feature. Not only could you induce cardiac arrest, but you could continually recharge the device and deliver shocks on loop," he said.
Manufacturers of implanted devices have been resistant to calls to publish their sourcecode and to allow device owners to inspect and modify that code, citing security concerns should latent vulnerabilities be exposed, and put implantees at risk. Read the rest
Ot from Bits of Freedom sez, "On 15 October, the Dutch ministry of Justice and Security proposed powers for the police to break into computers, install spyware, search computers and destroy data. These powers would extend to computers located outside the Netherlands. Dutch digital rights movement Bits of Freedom warns for the unacceptable risks to cybersecurity and calls on other countries to strongly oppose the proposal."
Three new powers: spy, search and destroy
The proposal (Dutch, PDF) would grant powers to the Dutch police to break into computers, including mobile phones, via the internet in order to:
* install spyware, allowing the police to overtake the computer;
* search data on the computer, including data on computers located in other countries; and
* destroy data on the computer, including data on computers located in other countries.
If the location of the computer cannot be determined, for example in the case of Tor-hidden services, the police is not required to submit a request for legal assistance to another country before breaking in. Under the current text, it is uncertain whether a legal assistance request is required, or merely warranted, if the location of the computer is known. The exercise of these powers requires a warrant from a Dutch court.
When the Overlook Hotel swallowed Jack Torrance's soul in The Shining, sucking him into their haunted history, did you ever wonder if Stanley Kubrick actually got a whole bunch of people to pose for that last vintage-looking photo of happy partygoers, with Jack Nicholson front and center? Or did you consider that it was an existing photo taken at a whole other party from another time? You might want to ask the gentleman pictured here, because he was actually at such a party, in that very real photograph.
The Overlook Hotel, which has its own Tumblr account, stumbled upon the pre-Photoshop retouching process for the memorable photo, which was originally taken in 1923. Used as an example for the magic of airbrushing, the process was detailed in The Complete Airbrush and Photo-Retouching Manual. In a nutshell, this unidentified man had his head replaced with that of Jack Nicholson, which sounds like the logline for a rejected psychological comedy called "Being Jack Nicholson." Visit the site to see the before-and-after shots.
Photo credit: The Overlook Hotel