Straight As again
Number Theory and Analysis: A
Intro to Logic: A
Engineering 123: Digital Circuit Design: A
Number Theory and Analysis: A
Intro to Logic: A
Engineering 123: Digital Circuit Design: A
[youtube hH-cpZZAUWQ]
This performance is absolutely haunting — when she kicks on the distortion it’s like a heart attack.
I missed her when she was playing a bunch of MA schools recently, I would love to see her some time.
These are the search rankings for greatestate.com, my wife’s real estate website, on google, for various terms:
weston real estate – #22
weston land — #30 (Community profiles page)
weston ma #53
weston ma real estate – #62
weston – #796
weston mass – Not in results
weston homes for sale – not in results
weston ma homes for sale — not in results
weston massachusetts homes for sale — Not in results
I’ve been doing a lot of research on the practice of computing the digits of Pi. The first question is, “Why?”. In the great majority of real-world applications, an approximation of few digits (i.e. 3.14) is close enough — it’s hard to imagine any calculation where an approximation to 20 digits would not be accurate enough.
One of the most interesting things about Pi is how much we don’t know — the “state of our ignorance” as Borwein puts it (CHECK). For instance, in all calculations so far, the frequency of decimal and hexidecimal digits has been very close to what you would expect from a completely random distribbution of digits (each digit has about 1/10th probability of occurring, or 1/16th for hexadecimal)… but there is no proof that this must be the case for all digits. In “Contact” by Arthur Clarke he speculated about a binary “message” hidden in the digits of Pi — we currently have no proof that such a message or similar statistical anomaly exists, though of course it seems unlikely.
Also, as an excersize in computability and algorithms, it is somewhat interesting to look at the records for calculating the digits of pi. The last few records have been set by Professor Kanada, using a number of supercomputers… the current record is about 1.3 trillion digits. In ASCII format, that’s 1.3TB of digits (or in a more efficient 4-bits-per-digit representation, 650GB). This means that memory/disk efficiency will be key, and algorithms that calculate digits indiviually will probably be preferred; if at all-possible, the only number of the final precision we want to store/use in our algorithm is our final answer, not a number of intermediate steps.
The algorithms for approximating Pi involve some kind of converging series.
Here are some links to interesting papers on this topic:
* Unbounded Spigot Algorithms for the Digits of Pi — Jeremy Gibbons responds to and improves upon the spigot algorithm proposed by Rabinowitz and Wagon in 1995.
* A Spigot Algorithm for the Digits of Pi — Rabinowitz and Wagon give a great “spigot” style algorithm for computing digits of Pi,
Ramanujan, Modular Equations, and Approximations to Pi OR How to Compute One Billion Digits of Pi . — Borwein, Borwein, and Bailey evaluate a number of different series and algorithms that converge upon Pi. with a focus on computability and speed of convergence. Expands on Ramanujan’s work.
I figured I would upload a bunch of cellphone pictures and comment on them.
Here is our table.. you can see various dumplings and mystery items in front of us.
Here is a view across the restaurant, the part in the foreground is only about 1/4 of the overall space. The place was HUGE, and basically they bring carts of dumplings and things past and say what they are (in chinese), and you grab what you want. Unfortunately, as a vegetarian, none of them seemed to know what the word “Meat” meant.
Here is the computer I am building. It has a Dallas version of an Intel 8032 as the CPU, and 32K of external memory, a 16 bit address bus (but the upper 32k of addresses are all IO space due to some lazy IO decoding), and an 8-bit data bus. I am building it as part of the engineering sciences E-123: Digital Circuit Design course at Harvard Extension school. Notice the nice hex keypad. Right now I have to manually program it a byte at a time, because I have not yet added a serial port and software to allow me to send data from the serial port into memory.
Here are a couple of the guys with the potato cannon I built. Notice the landern igniter and large cumbustion chamber.
Here is a typical Harvard undergrad, she has fallen asleep in a common room while studying with her laptop.
Things to Learn and Where to Learn Them:
Music:
Toys:
Games:
Books and Authors:
Just got my fall term grades:
Analog Circuit Design: A
Cyberlaw: A
Comp Sci (C programming in Unix): A
Hopefully I can rock the spring term the same way I did the fall, I’m taking Intro to Logic, Digital Circuit Design, and Analysis + Number Theory. The analysis course is the only one that has me worried, I’m a little rusty on the math stuff.
It was after sunset, and all light had been extinguised in the clearing, circled by small tents and cabins. Moments before, it had been bustling with activity, but now it was strangely silent and empty, with a few other scattered strangers disappearing in darkness as the last lights of day faded and clouds obscured the starlight. People like me, who weren’t sure they belonged.
And then – in the distance – multitudinous sweet voices in harmony could be heard approaching. Moments later, a column of dim hooded shapes snaked past, circling the field. They seemed to be singing of joy and wonder — and of ideals, and of service, and of their Queen. Small figures in green could barely be seen.
They come to a stop, and stand at attention. A woman approaches the center and lights a camp fire — the light illuminates young faces that were hidden before. She addresses them all and leads them in prayer. They respond to her in voices and songs, knowing their part in this secretive ceremony. Each girl is brought to the center of the circle and given solumn rewards and honors for her accomplishments. Finally, a candle is lit, and as the points of light spread around the circle the faces are illuminated in a promise, a covenant to keep the spirit alive until next year.
I was lucky to get the chance to help pick Valerie up from camp.
Download the mp3 of my podcast — this is an empathic argument for open access in education, inspired by eminem’s final battle in “8 mile” where he wins by making the other guy’s argument for him. No apologies to Weird Al, this is some homegrown dirty south style white boy crunk.
Because of my Cyberone class I’ve been thinking a lot about virtual worlds and the ethics and control systems inside those worlds. I am wondering, what would it take to create a totalitarian, oppressive government inside Second Life? Could one arise independently of the world’s technical admins?
I thought I’d upload this essay I did for a summer expository writing class. I took the class with my stepson Avery, it was a lot of fun. The essay is about how free software saved my life, and the way I feel I must repay that debt of honor.
Hola amigos, it’s been a while since I rapped at ya. I’ve been really busy with school and work and marriage and step-fatherhood and all the other stuff I do to keep busy. Just last week my company started running radio ads for the product I designed, efact. We’ve also sent out postcards to a few thousand real estate conveyancers, and have a team of cold-callers calling all of those conveyancers to tell them about the product. It seems to be selling very well, but the rollout is keeping me very busy.
My classes are just starting right now also — I am in a class called CyberOne: Law in the Court of Public Opinion. It is taught by Charles Nesson and his daughter Rebecca. It’s only been going for a week, but so far it seems like it might be one of the coolest classes I’ve ever taken. Parts of the class are being held in Second Life, and CBS Evening News is supposedly going to do a special about it because it is so innovative. I am also taking a programming class (on linux, unix, C, CGI) and a laboratory electronics class.
I’ve had some kind of illness for quite a while now, I’ve been on two different kinds of antibiotics but I just can’t seem to kick it. I hope I get better soon.
I saw this link to an LA Times story. Stephen Heller, a word processor who stole copies of internal Diebold documents revealing that they had violated California state law and sold uncertified voting machines, is now facing felony charges for access to computer data and computer burglary.
It’s a sad day in America when Sony can break into hundreds of thousands of computers (including government, military, etc) to illegally spy in order to try to profit, and get a slap on the wrist, while a whisleblower who reveals corrupt voting machine manufacturers and potential voter fraud faces felony charges.
While I certainly understand where all of the protestors are coming from with the current anti-google movement, I’d like to put forth a conflicting opinion. I, for one, actually buy the excuse that it is worth participating in some censorship just to be able to enter the market. I believe there are a number of reasons for this:
Here’s a link you probably won’t see anywhere else, an article from China Daily (the state-run periodical, the voice of the Chinese Communist Party in English essentially) mentioning John Howkins’ talk at a chinese business summit. He talks about how adopting US-style copyright and patent law might have a downside, and emphasizes that future IP law should embrace innovators who want to share their work as well as ones who want to protect it.
I hope they listen to him. And I hope they abandon their one-party government and adopt a sensible representative democracy, while they’re at it.
I have always felt very strongly that technology can serve as a tool of oppression or a tool of liberation. Perhaps when we have made enough progress in our struggle I will change the name of the site to cyberliberation instead of cyberoppression.
I wanted to take this opportunity to create a quick overview of how those of strong character and good hearts must work to prevent the totalitarian nightmare that technology might lead to, and how to instead work towards creating a better future for our children.
If we do all of this, we have a chance at a future where everyone in the world has absolutely guaranteed human rights and civil liberties. We have a chance at a world where the slightest hint of oppression is met instantly by an overwhelming power of people doing good. We have a chance at a world where everyone has free access to a world-class education, access to study at Harvard or Cambridge or anyplace else. Access to teachers, mentors, books. Access to communications.
This site has a java/browser-based Apple II emulator and an _incredible_ collection of disk images that you can boot. A little Oregon Trail or Rocky’s Boots or LogoWriter, anyone?
It’s interesting because though this site is almost certainly _technically_ in violation of copyright, these are programs with absolutely no commercial potention and that are no longer being sold or manufactured. In many cases, the companies that originally produced them are out of business. There is very little threat that those running the site will be sued for copyright violation. To me, this brings up an interesting point: that the current indefinite copyright period (every 20 years the industry pumps a few million into lobbyists in order to get Congress to retroactively extend it another 20 years, so at the rate copyright for 20th century works will never expire) is completely out of line with the pace of the software industry.
I noticed a link to this site from Slashdot. Ty Rogers and Ray Beckerman, two lawyers in NYC, have created this site to compile information that might help assist people defending themselves against RIAA lawsuits. Slashdot mentioned that they are defending a woman the RIAA sued for music piracy who actually has never owned a computer in her life. It’s nice to know there are men of strong conscience out there, fighting the good fight.
I saw a link to this reuters story on Arstechnica:
The Paris-based World Association of Newspapers, whose members include dozens of national newspaper trade bodies, said it is exploring ways to “challenge the exploitation of content by search engines without fair compensation to copyright owners.”
This is very typical of the content industry’s response to innovation. Google is bringing their sites more traffic and interest. I find their approach to be hypocrisy in the extreme; they claim Google is trying to profit from their works without fair compensation, when in fact Google is providing a valuable service. It’s the newspaper industry themselves who no longer provide the same valuable and necessary service they once did; the ability of the internet to instantly distribute content from writers to readers at little or no cost has made much of the service provided by publishers (who once served as a middleman between content and consumer) obsolete. An industry faced with the prospect of obsolescence, instead of finding ways to change their business model so that they can continue to provide a valuable middle-man service (like google is doing), are concentrating on trying to legislate a permanent monopoly, a “right to profit” in order to preserve their relevance.