Now Hear This

 

This is a golden age for listening to audiobooks on portable electronic devices like smartphones and iPods, but the high price of audiobooks still holds them back from becoming as popular as electronic books or printed books. Before the inclusion of compact solid state storage on portable devices, audiobook listeners were encumbered with multiple compact discs (CDs) or cassette tapes for each book. The combination of compressed audio formats with high capacity compact storage has unlocked a perfect setting for listeners to take advantage of audiobook downloads from the internet and then enjoy a seamless listening experience any time and anywhere.

 

While the marriage of hardware technology with software format is now ideal for enjoying audiobooks, the pricing remains a stumbling block. Regular prices can start at $15 and go on up to $100. In any case, the audiobook price is always the highest of any of the formats, from hardcover or paperback print to ebook. Production costs for publishers are higher naturally because of the need for voice talent, production personnel, and recording facilities. It may be that to produce a truly professional result the costs cannot be lowered, and therefore audiobook prices will remain high. That would be a shame, since the technological moment has never been better and that has in turn increased demand. If increased demand does not drive the price down, then most likely audiobook sales will hit a wall, and new listeners will no longer be drawn to the format.

Anker Sonntagnachmittag 1861
Sunday Afternoon, an 1861 painting by Albert Anker (1831-1910).

There are some alternatives to the business model of publishers producing audiobooks themselves or licensing their books to production studios, a model resulting in high overhead costs which increase the prices of best sellers and niche books alike. One alternative encourages authors to engage voice talent and production facilities and staff more or less on their own, knocking down the overhead costs. An author could still go for high concept production, but most have not. This business model has had the effect of increasing the overall amount of titles with audiobook versions, and at better prices than the standard publishers’ audiobook versions. It seems the publishing houses have been unable to take advantage of the audiobook’s golden age on account of their lumbering dinosaur steps, and a more nimble approach was needed.

Another alternative is the free model of LibriVox, staffed by volunteer readers using their home studios. The books they read are all in the public domain, and are free to download, with no digital rights management encumbrances. LibriVox is a laudable project, and even though there are no modern best sellers available for listening, the collection of classic literature is extensive. As can be expected with volunteer readers producing their efforts themselves from probably quite modest facilities, the results are wildly uneven, sometimes within the same audiobook, since LibriVox occasionally parcels out different chapters to several readers. Listening to LibriVox audiobooks is therefore a hit or miss experience which can be useful all the same in filling in gaps for a listener, especially when it comes to the classics.

The enjoyment of listening to a great storyteller goes back to childhood individually, and to the beginning of history for the human race as a whole.
It appears the audiobook industry has settled on the monthly subscription model as its most effective way to sell to listeners. Relatively few people are interested in buying titles outright considering the high prices. Subscription rates for only one or two audiobook downloads per month are also high, but at $10 to $20 they seem easier to swallow. The public library is yet another alternative for downloading audiobooks, although because of budget cutbacks libraries are having more difficulty than ever stocking a selection of audiobooks comparable to their print book inventory. For an audiobook fan with a middle class or slimmer amount of disposable income, putting together a home audiobook collection like a roomful of long playing records or several bookcases filled with paperback books is probably not feasible. For a frequent listener, the rental plan offerings are not very filling at only one or two audiobooks per month. A little of this and a little of that might be the best strategy for an audiobook fan with shallow pockets – a monthly subscription if it can be had at a good rate, an active library card, and an electronic bookmark for the LibriVox website.
— Techly

 

Fahrenheit 161

 

There are several time and temperature combinations for pasteurizing milk, but one of the most common involves heating it to 161 degrees Fahrenheit for 15 seconds, known as High Temperature Short Time (HTST). The milk still needs refrigeration afterward to slow the growth of microorganisms that may remain in it, since pasteurization kills most of them but does not completely eliminate them from the milk. In Europe, milk is most often treated with Ultra High Temperature (UHT) at 275 to 302 degrees Fahrenheit for 4 to 15 seconds, making it aseptic and capable of being stored at room temperature for up to six months. Both processes have grown out of public health measures which have transformed food safety over the past 150 years, a period when such oversight was especially needed as increasing urbanization meant fewer people retained direct connections to the production of their food.

 

Emile Charles Dameron Besuch am Bauernhof
Visit to the Farm, painting by Emile Charles Dameron (1848-1908).

The body temperature of a cow is 101.5 degrees Fahrenheit. That is well below the 145 degrees Fahrenheit which is the absolute minimum for any kind of effective pasteurization. Drinking raw milk can be safe for only a short time before any pathogens present in it start to proliferate. Calves have understood this for millennia, which is why they have never bothered with any storage measures. They drink mama’s milk straight from her udder, and that’s been good enough for them. Things are different and more complicated with humans, as they always are. To begin with, it’s strange for one species to be drinking the milk of another at all. Be that as it may, people have decided they enjoy drinking cow’s milk, and apparently have done so for millennia, though not as long as the calves the milk was meant to succor.

In the ensuing thousands of years, and especially in the past 150, people have moved off farms and into cities in such great numbers that the majority of them now do not come any closer to cows than a hundred yards or more on a drive through the countryside. This means they have little idea of the conditions those cows live under and are milked under, and also rarely have the opportunity to drink that milk as it was meant to be drunk, at 101.5 degrees Fahrenheit within seconds of milking. So to get around all that we cook the milk. Raw food can be a great, healthy addition to anyone’s diet, but for the sake of safety we cook a lot of our food, and particularly food we haven’t grown or raised ourselves and aren’t prepared to consume immediately. Cooked food must be an acquired taste, because obviously in nature food is seldom cooked. Our ancestors must have discovered good reasons to cook food, probably through much trial and error involving unfortunate intestinal distress or even death. Louis Pasteur observed under the microscope the reasons for our ancestors’ common sense use of fire to cook food. Cooking food may not be the most natural thing, but it’s better than guessing and throwing the dice. Fire is good.
— Techly

A scene from Mel Brooks’s 1974 film Young Frankenstein, with Peter Boyle as The Monster, and Gene Hackman as Blindman.

 

Just Say No

 

As if the lack of trust hadn’t sunk low enough between internet users, advertisers, and the websites which host advertisements, along comes cryptojacking, a method for either honestly or dishonestly using the computing power and electricity of internet users to mine cryptocurrency. Last week, users of YouTube in some countries noticed that their antivirus and antimalware programs were alerting them to code hidden in ads on YouTube which were enlisting their computers for cryptomining without their permission. Google, which administers YouTube, claims to have fixed the problem. Unfortunately, there are many small websites that don’t have Google’s Information Technology (IT) resources and may have been hacked and had cryptojacking code installed without their knowledge.

 

Cryptojacking sounds like it should be illegal, but oddly enough it is not. There can be repercussions such as blacklisting for hiding code in ads, and of course this sort of activity serves to push more people toward the use of ad blockers, which deplete the revenue of honest websites as well as dishonest ones. There are now outfits on the web, Coinhive being the most notable, which promote to website owners the idea of replacing ads altogether with a bit of JavaScript code on the website itself that will enlist the computers of visitors in mining Monero, a type of cryptocurrency that, unlike Bitcoin, doesn’t require high end equipment. Coinhive takes 30% of the resulting mining revenue, and the website owner gets 70%. Coinhive rather dubiously promotes this as a fair business model for the website owner in a time of declining revenue from ads, while not mentioning its relative fairness for the website visitor.

Cryptocurrency Mining Farm
A mining farm of Genesis Mining in Iceland. These are mainly Zeus scrypt miners. 2014 photo by Marco Krohn. No subterfuge involved in this cryptocurrency mining operation. Note that because the calculations required to create the currency generate a lot of heat, there are fans at the ends of all the units.

As originally set up by Coinhive, the JavaScript ran without the internet user’s knowledge or permission. If an internet user visited a website running Coinhive‘s JavaScript code, and the user’s security software did not alert the user or block the code from running, the only indication the user had of being legally cryptojacked was how unusually busy their computer was and, when the electric bill arrived, how unusually high it was. Savvy computer users might also check running processes monitored by the task manager on their computer. But it’s a good bet that most computer users have no idea about task manager or where to find it on their computer. Some users don’t run any security software at all, or if they do, they misuse it. Running Coinhive software without the knowledge or permission of website visitors is sneaky at best, and more likely just plain unethical, and any arguments from Coinhive or anyone else that it is a fair replacement for ads is mere sophistry.

After some amount of pushing from internet users, Coinhive started offering an above board, opt-in type of cryptomining code so that website visitors knew what was being asked of them. Naturally that version has not proved popular with the website owners who partner with Coinhive because advising visitors of cryptomining activity only leads to the great majority of them declining to participate. People who are not computer savvy, when confronted with an option which will in all likelihood confuse and frighten them, will resort to the safest option and just say no. More computer savvy visitors will likely decide it’s not worth their while to have their computer slowed down to a crawl and their electricity bill hiked by a few dollars a month just to visit a website. Only the most indispensable websites could get away with it, and they are apt to have access to many other less complicated sources of revenue. Coinhive, meanwhile, continues offering the original, surreptitious version of its software.

Naturalist David Attenborough discusses brood parasitism among birds in this BBC wildlife segment.

The arms race between website owners and advertisers on one side, and website visitors on the other side, began when internet service was incredibly slow and most consumers had data caps. Ads, particularly Flash ads that jumped up and down to attract the visitor’s attention, slowed down internet service even more and sucked up the visitor’s limited data. Enter ad blockers. The thing about ad blockers, however, is that even though most of them offer users the ability to whitelist websites, most users are either unaware of that option or don’t bother to use it unless prompted by the website. Ad blockers often act effectively as blunt instruments then, punishing honest websites which display discreet, reputable ads in an above board manner, along with dishonest or careless websites which display gaudy ads that may or may not harbor malicious code. Like many other areas of life, on the internet a few bad actors can spoil the honest efforts of the majority of website owners. The answer to declining revenue from the arms race between advertisers and advertising blockers is not for website owners to get sneaky, however, which erodes trust, but to develop trust with their visitors and exercise restraint on their advertisers.
— Techly

 

Surprise, Surprise

 

After the Federal Communications Commission (FCC) five member board voted along party lines to roll back Net Neutrality regulations last month, it wasn’t surprising to see some major Internet Service Providers (ISPs) trot out rate increases soon afterward. The new regulatory structure doesn’t take effect until 60 days after it is published in the Federal Register, which may take a few more weeks while the FCC completes final edits to the paperwork, but companies like Comcast just couldn’t wait. Meanwhile, in another predictable outcome of the end of Net Neutrality, over 20 states have started instituting their own rules in an effort to adhere to the old guidelines, while also suing the FCC to prevent it from trying to impose its new rules within each state.

 

This comes down to regulating interstate commerce in the form of communications companies, which is the only reason for federal agencies such as the FCC to exist. It will all have to be sorted out in the courts, and that could take years and many millions of taxpayer dollars, all because FCC Chairman Ajit Pai turned a deaf ear to the majority of Americans while he listened very closely to his corporate masters, such as at Verizon, where he worked as a corporate lawyer before being appointed to the FCC by President Barack Obama, at the behest of Senator Mitch McConnell (R-KY).

Reinstate Net Neutrality sign, Women's March, DTLA, Los Angeles, California, USA (39824631401)
“Reinstate Net Neutrality” sign at the January 20, 2018, Women’s March in downtown Los Angeles, California. Photo by Cory Doctorow.

There have been noises from Congress about legislating Net Neutrality, or a semblance of it, once and for all, thereby stripping the FCC of its bouncing ball regulations. Even if one of these measures manages to squeak by with enough votes in Congress, it will then cross the whistle-clean desk of Supreme Leader, who after all is the one who elevated Ajit Pai from FCC board member to chairman, most likely with the express purpose of encouraging him to gut Net Neutrality for the benefit of corporate giants. Supreme Leader will veto any legislation that undercuts his man at the FCC, and there will not be enough votes in Congress to override his veto, since that would require the votes of two thirds of the members.

Day of Action to Save Net Neutrality 04
One of the ironic slogans used by the non-profit organization Fight for the Future to promote the July 12, 2017, Day of Action to Save Net Neutrality.

In that case, it appears everyone will have to get used to paying through the nose for broadband internet service in areas of the country where there are only one or two providers, which is to say most areas. Consumers could pay less in a tiered system for service at the speed of dial-up, which is what the FCC has opened the door to now. Instead of being regulated like utilities, which must provide similar service to all consumers universally, the ISPs will be regulated like cable television companies, a business some of them have also been in for years.


The problem vexing consumers is that they usually have few choices for providers of these services, although they have slightly more choices than they do when it comes to their electric service. Still, in a market with limited competition, the advantage lies entirely with the unregulated company that is unfettered to charge whatever it can squeeze from captive consumers. Take it or leave it.


“Wildflowers”, the title song of Tom Petty’s (1950-2017) solo album from 1994.

The last area where ISP giants are working to complete their cornering of the market is in the contest over municipal broadband services, which are usually public/private partnerships between municipalities and smaller ISPs, where the municipality provides some infrastructure and subsidies, and the private company provides the hardware, operations, and maintenance. Municipal broadband often provides better service and better rates to consumers than they can get from the big companies, and is likely to provide service to poor and rural consumers who otherwise would have no service options. No wonder the big companies are intensively lobbying state and local officials to choke off municipal broadband. It appears their greed compels them to throttle competition and now, at their discretion, some services to their customers.
— Techly

 

What’s in Your Head?

The Cranberries (6856973494)
Dolores O’Riordan of The Cranberries performs at the Sydney Entertainment Centre in Australia in March 2012. Photo by Eva Rinaldi.
The title of this post is taken from a line in the 1994 song “Zombie”, written by Dolores O’Riordan and performed by her and her band mates in The Cranberries, namely Noel Hogan, Mike Hogan, and Fergal Lawler, on their album No Need to Argue. She wrote the song in response to news of an Irish Republican Army (IRA) bombing in 1993 that killed two children and injured dozens of bystanders. The zombies of the song are those emotionally hollow, walking dead who will not let go of old political grudges and slights, and persist in their violent ways without concern for whom they harm. The song exerted a large influence in pushing the warring sides in Northern Ireland toward peace. Dolores O’Riordan died unexpectedly Monday at a hotel in London, where she was staying while she worked on a short recording session. She was 46.

The original music video of “Zombie”, which has made an enormous impression around the world since its release in 1994.
The notable thing about Ms. O’Riordan’s singing voice, besides her range, her clear enunciation in an Irish accent, and her use of keening and wailing, was her honest, unaffected vocal presence. There are so many recording tricks available to music producers now that things like a poor, thin voice can be masked with production and electronic effects, and the lyrics can be lost in all of it, though for some songs and performers listeners may not care about that. But while The Cranberries and their producers, notably Stephen Street for the early albums, took advantage of such effects as layering Ms. O’Riordan’s voice with multiple recordings, they never appeared to do so in an effort to disguise a lack of talent, but in the interest of adding depth and harmony to a song. Listening to her sing in settings where no recording gimmicks were available confirms that sense. The tremolo in her voice when she sings parts of “Linger” is all from her and her talent and her capacity for investing emotionally in the lyrics she wrote.

A 2012 visit to the NPR studios showcased the quality of Dolores O’Riordan’s voice and the musicianship of The Cranberries. The set list of five songs from first to last was comprised of “Linger”, “Tomorrow”, “Ode to My Family”, “Zombie”, and “Raining in My Heart”.
Something Else, the last album Dolores O’Riordan and The Cranberries made, was a 2017 collection of some of their hits along with a few new songs, all done acoustically with the accompaniment of the Irish Chamber Orchestra. For almost any other rock band such a presentation might come across as a pretentious, formulaic repackaging done primarily to generate revenue by capitalizing on past success. The Cranberries could get away with it because they were unassuming musicians surprised by their own success, whose sincere desire was to record an album of something genuinely new for themselves and for their fans. The songs they crafted were their own style, despite the pigeonholing common in the music business, where styles are called grunge or pop or folk or rock. They were some of all those things, not wholly invested in any one style. They were who they were (and remain, of course, while three of the four band mates live), young people from working class families in and around Limerick, Ireland, without grand desires to upend the world of music, which they did not do in any event. No matter. They worked steadily at crafting some great music while saying worthwhile things in their tunes, and the Irish songbird Dolores O’Riordan was not just a singer and guitarist and songwriter for the band, but an exemplar for them and us of a true original.
― Techly

 

Open Sesame

 

The latest crisis in computer security comes from news of the Meltdown and Spectre Central Processing Unit (CPU) exploits. Nearly all desktop and laptop computers are affected, and most tablets, smartphones, and other small devices are also affected.* The difference is on account of the types of CPUs used for the various computers and devices. Since home users usually access password protected accounts like email and online banking from smaller devices as well as larger computers, they could see their privacy and online security compromised across platforms. In other words, hackers can exploit a hardware flaw in the CPUs of home computers, and then hackers could use that vulnerability to access private email and banking passwords in software that crosses platforms.

 

עלי באבא מתחבא על העץ
In the story “Ali Baba and the Forty Thieves”, Ali Baba overhears one of the thieves say “Open Sesame” to open the entrance of the cave where they store their loot. Illustration by Rena Xiaxiu.

CPU makers like Intel† are racing to fix the problem, which was first discovered by Google security researchers last June, and internet browser makers, where many users store passwords, are hurrying to tighten security on their end. In the meantime, people need to be vigilant about email and banking security themselves, starting with changing their passwords if they suspect unusual activity in their accounts and running a full suite of anti-virus, anti-spyware, and anti-malware programs on their computers. Those are routine security measures that people ought to be taking already, but unfortunately some folks don’t even do that much. When their computers are compromised by hackers, those home users are often as not completely unaware they are being used as part of a rogue network, called a botnet, to spread spam and other nasties throughout the internet. When everything is linked as with the internet, the weakest links are the easiest targets of hackers.

Even after tightening up individual computer security by using strong passwords and storing them securely, by not clicking on links in untrusted emails, by surfing the web safely using the anti-phishing feature built into most browsers, by regularly updating a security suite and running scans with it, even after all that a careful home user can still have difficulties, whether it’s because of something completely out of their control in the so-called cloud, such as when credit reporting agencies got hacked, or simply because their Internet Service Provider (ISP) momentarily gives them the Internet Protocol (IP) address of a blacklisted spammer, causing their email provider to block their account.

Since the majority of IP addresses are dynamic rather than static, meaning that each time a computer user connects to the internet the device that user is on, or possibly a larger network it is part of, is assigned a different IP address rather than keeping the same IP address from session to session. Because dynamic IP addresses are recycled, it’s a wonder that the unfortunate coincidence of being assigned a blacklisted address does not happen more often than it does. It’s impractical to remove a bad address from the rotation entirely because spammers can jump from address to address so quickly that soon all of them would be blacklisted, or the addresses would have to be prohibitively long.

Alfred Hitchcock’s 1956 film The Wrong Man explores the nightmare of mistaken identity.

The other way to get blacklisted as a spammer is to get hacked as described earlier, either through negligence or bad luck, and end up an unknowing part of a botnet distributing spam to friends and strangers alike. The use of biometrics like fingerprint and iris scans are no better a solution to account security than passwords since hackers have been at work on spoofing mechanisms for biometrics. Police can also compel people to grant access to their computers and other devices when they are locked by biometric measures, whereas they cannot compel people to divulge their passwords. There is no single, simple solution to keeping private data entirely secure on any computer or device as long as it is connected to the internet. It’s like the locks on doors and windows, which ultimately will keep out only honest people. Dishonest people will find a way in if they are determined enough, but it’s better for everyone else if it’s not too easy for them, and if they get caught sooner rather than later.
― Techly

*Post updated to enlarge number of devices affected.

†In November, long after he had learned of the vulnerability in his company’s products, but of course before the flaw had become general knowledge last week, Intel CEO Brian Krzanich sold almost all of his stock in the company for $39 million.

 

Joy in a Toy

 

With Christmas past by several days now, many children will be enraptured by a new toy or toys if they were lucky enough to receive them. The trend now is for giving more technologically sophisticated toys even to small children, but a simple toy such as a rubber duck can give a small child many hours of joy through encouraging the use of imagination, while some complicated toys do everything for the child, who quickly becomes bored through passivity.

 

For such a simple toy, the rubber duck has become enormously popular since its introduction in the form we recognize today in the mid-twentieth century. Some rubber ducks squeak when squeezed and others don’t, but all are hollow with a weight in the bottom, so that they always float upright. Of all toys in America, perhaps only the teddy bear is more popular than the rubber duck. A teddy bear does even less on its own than a rubber duck, however, since some won’t float, and it certainly doesn’t know which end is up when it does float.

Tall Ships Festival (14847730919)
The world’s largest floating rubber duck, designed by the Dutch artist Florentijn Hofman, is towed in Los Angeles harbor in August 2014 as part of the Tall Ships Festival. Photo by Eric Garcetti.

The technology employed in making rubber ducks is some of the simplest in manufacturing, involving rotational molds, heat, and some hand painting. The toys are not made of rubber anymore, since that has gotten too expensive. Manufacturers instead use a non-toxic vinyl which will be safe for toddlers, who inevitably will chew on the toy. The paints also are designed for child safety. Like many manufacturing plants in the past half century, the ones for making these simple toys had moved overseas, primarily to China, until one company returned part of its manufacturing to the United States. That company struggled at first to find a factory and skilled workers, evidence of how quickly disused facilities and worker skills melt away without investment.

For all the stories in the news about how Silicon Valley technological companies like Apple and Google are leading the way for the American economy, and how the less educated workers who don’t fill that mold will just have to make do with minimum wage jobs in the service economy, flipping burgers at McDonald’s or driving Ubers, there are millions of workers who are not cut out to be software engineers but who nonetheless could use better paying jobs to help their families not merely stay afloat, but get ahead in the world.

In this clip from an early episode of Sesame Street, Ernie the Muppet sings “Rubber Duckie”, the 1970 song that set off a resurgence in popularity for the toy.
These are people who may never invent the next big thing in computers or smartphones or driverless cars, but whose children possibly could if given a fair chance at a good education without sinking the family into poverty. In the last fifty years, while the rich in their opulent yachts have gotten ever richer, the working class has been cut adrift from the mainstream economy by the loss of good paying manufacturing jobs, and the middle class has been kept busy furiously kicking to keep from drowning. Not everything has to be complicated or technologically sophisticated to work well in the world. Sometimes all it takes to make people happy is a simple toy that knows enough to bob upright in the water and keep afloat with a plucky smile.
― Techly

 

The Proof Is in the Printing

 

When a computer printer works as it should, smoothly turning out page after page and photo after photo, it’s a wonderful thing that is easy to take for granted. But when that printer acts up and doesn’t feed pages or photos properly, or prints unevenly in streaks even though it has full ink cartridges, then a user’s patience can be stretched to the limit of frustration. Unlike the computer a printer is often connected to, a printer has a lot of moving parts, and that is typically the source of their malfunctions.

Since a home user likely has an inexpensive inkjet printer, replacement of the entire unit is usually preferable over any repair that will get time consuming and therefore expensive. The cost of such a printer is subsidized by purchase of proprietary ink cartridges at inflated prices, which is an economic model a bit like cell phone subsidizing through service contract, but not quite. In the case of a cell phone being available at a nominal initial cost while the complete cost is spread out over the term of a two year contract, the user of the phone is the one and only subsidizer. With printers, the artificially low cost of many of them is subsidized by all the users of the ink, and the heaviest ink users do the most to support the cost of printers for everyone.


If people had to pay the full cost of a printer, they might have a better understanding of the value of these remarkable machines. Like computers, printers that fit on a portion of a desktop now are doing the work that machines in earlier times did while taking up a full room. The inflation adjusted price has also gone down over time, and really the comparison of technological capability does not hold up beyond basic numbers in saying that a modern desktop printer or computer can do the same work as room size machine of fifty years ago. The new machines can do much, much more.

PrintMus 038
Peter Small demonstrating the use of the Gutenberg press at the International Printing Museum in Carson, California, in 2009. Photo by Flickr user vlasta2.

What appears to make a printer a special object of loathing when it doesn’t work as it should is the usually mechanical nature of its breakdowns, something that people have a visceral understanding of, rather than the electronic or computing problems of a computer or its hand held cousin, the smartphone, which many people find inaccessibly difficult. When a printer’s paper feed mechanism breaks down and starts chewing up pages, leaving a crumpled mess stuck partway in the printer’s maw, it’s like a willful dog has chewed up our slippers. We can understand that, and it taps into an older, simpler part of our brains than the aloof error message we occasionally see on a computer screen.

In this scene from the 1999 dark comedy Office Space, written and directed by Mike Judge, a few workers take out their frustrations on the temperamental office printer, a stand-in for their frustrations with their workplace generally. Warning: foul language.

This time of year, Christmas, can be especially perilous for an inexpensive home inkjet printer to get glitchy. People are trying to print out photos for their Christmas cards, invitations for parties, and year end summations of their activities and personal growth to include in Christmas cards. In addition to the increased demand on their services in the lead up to Christmas, another danger to marginally useful printers is the frazzled, harried state of mind of their users during the year end holiday season.

No, a printing machine at Christmas that has started to show its age and groan with mysterious mechanical aches and pains is more likely to end up getting recycled by a user whose patience is at an end, rather than get repaired and restored to tip top condition. The latter outcome would be more likely if the printer was valued at its true price. Instead, the home user will replace it with a new printer promising two or three years of trouble free operation. The lesson there for the home user is that inexpensive inkjet printers are a reasonable investment for light use, but people who print a lot are better off with a more expensive machine that reflects its true value, is worth repairing, and relies on a fairer economic model than the highly subsidized market for ink.
― Techly

 

Shave and a Haircut

 

Two bits! There, that feels better now, doesn’t it? A sense of completion and the comfort of familiarity. The phrase “two bits” indicates twenty-five cents specifically, and can also mean something cheap generally. The digital currency bitcoin apparently derives its name from the old fashioned uses of “bit” to indicate parts of a dollar or other currency. At the current exchange rate of around 15,000 dollars to one bitcoin, however, a bitcoin itself represents anything but parts of a dollar. Quite the opposite.

From the 1988 film Who Framed Roger Rabbit, the irresistibility of finishing off “Shave and a haircut, — —-“.

The record high valuation of bitcoin may not stand for long, and in six months one bitcoin may be worth 30,000 dollars or it may be worth 150 dollars. No one knows for sure, and that’s what is fueling a lot of argument and speculation. High amounts of speculation in the market are what inflates a bubble, and the question with bitcoin is whether it is indeed a bubble and when it might burst. That generates more speculation. More small investors buy into the market. Historically what has happened in such cases is that something happens, a large investor or two gets spooked, dumping shares on the market, a selling panic ensues as everyone tries to get out of the market while the watch the value of their investment plummet, and that’s it, the bubble burst.

Bitcoin or something like it will be around for as long as there is an internet and a demand for a monetary barter system which is decentralized and doesn’t involve significant charges going to middlemen such as banks or credit card companies. As more people use digital currency and more merchants accept it in transactions, the volatility of its valuation will settle down. Tulips are still around, after all, and people still value them, just not to the unrealistically high degree they did when the bulbs were novel. The long term problem with digital currencies generally, and bitcoin in particular, will be in decreasing the horrendous energy demands of mining them and, to a lesser extent, processing transactions. The electricity demands of mining bitcoin are now equivalent to those of Serbia, and will soon be on a par with Denmark’s electricity use.

Discussion of whether the current valuation of bitcoin represents a bubble often refers to Charles Mackay’s 1841 book Extraordinary Popular Delusions and the Madness of Crowds, and particularly to Chapter 3, “The Tulipomania”.

Much of the mining occurs in China, using electricity generated by coal-fired power plants. At a time when combating the effects of global warming is becoming a top priority, the mining of bitcoin could present an ecological catastrophe when it reaches the same level of energy consumption as that of the entire industrialized world, as it is predicted to do in the early 2020s. The digital currency genie is out of the bottle, and there’s no stuffing it back in. That leaves two options, or a combination of both – finding more energy efficient ways of mining digital currency, or using more environmentally friendly energy sources, such as solar.


The solar energy option is immediately attractive because it would help defray installation costs of solar arrays more quickly and because poorer countries, which are generally nearer the equator and hence in sunnier climes, could see income from a source that is neither environmentally nor socially destructive the way production of sugar or other cash crops has been for them. Puerto Rico, the United States territory that recently had its conventional power grid devastated by Hurricane Maria, could benefit by rebuilding with the intention of using solar energy at least partially for the profitable production of digital currency. Surplus energy from the arrays built with money from bitcoin mining would power homes and businesses at subsidized rates for people who could not afford it otherwise in very poor parts of the world. Smaller, locally owned solar arrays would be a better way to produce power because of the inefficiency of transmitting solar power long distances either in the form of direct current, or after inverting it into alternative current. Decentralization of the means of production would also serve to keep power and money in the hands of locals.

De Waag Bitcoin
Bitcoins accepted at a café in Delft, The Netherlands, in 2013. The Netherlands became a center of the tulip trade in the seventeenth century during “The Tulipomania”, and remains a primary grower of the bulbs to this day. Delft lent its name to a particular kind of pottery and the shade of blue it is renowned for, which has also been applied to some flowers bearing the same shade of blue. Photo by Targaryen.

Should you invest in bitcoin? That depends on your outlook. In the currently volatile market, investing in bitcoin should be treated like gambling. In other words, don’t invest any more of your government backed (in the United States the currency is actually backed by the Federal Reserve System, a private institution of the banking industry, though it is insured by the federal government) currency than you can afford to lose. For some people that can be quite a lot, but for most people that would amount to very little.

Should you get involved in bitcoin mining and processing of transactions? At the current valuation of bitcoin, that could be quite profitable. Tomorrow its valuation could drop below the cost of the electricity required to mine it. At any rate, the “mining” simile is somewhat inaccurate, since in a comparison of the digital currency market to real world mining, the people with computer equipment engaged in its production and in the processing of transactions are actually more like the merchants in a nineteenth century American mining town who sold goods to the miners who were hoping to strike it rich.

The opening scene of Powaqqatsi depicts working conditions at the socially and environmentally disastrous Serra Pelada gold mine in Brazil. This 1988 film by Godfrey Reggio, with music by Philip Glass, is the second in his Qatsi trilogy of meditative documentaries.

A very few of those miners struck gold, and most went bust, while the merchants usually did consistently well, a few becoming household names still known today, like Levi Strauss. If you do get involved in bitcoin “mining”, it might help to connect the equipment to a solar array rather than the conventional power grid, because then when the bubble bursts and the valuation of bitcoin drops to the floor, you can possibly still operate at a profit when others cannot, or at the very least you will have an inexpensive, environmentally friendly source of power for your other ventures.
― Techly

 

In Comcast We Trust

 

Recently one of the minority Democratic members of the five person board of the FCC took the unusual step of writing an article for distribution in the popular press urging the public to sit up and pay attention to what the majority Republican members of the board are attempting to do with a vote on December 14 to repeal net neutrality rules. Jessica Rosenworcel asked the public to make a fuss with the FCC and with Congress to try postponing the vote until after public hearings. The vote will likely still take place on the 14th, and the outcome is certain considering the three to two Republican majority on the Commission board. The next step will probably see the rule changes challenged in court, with litigation taking years.

Congress could change how a regulatory agency like the FCC goes about its business so that it is less swayed by the variable political winds, but it appears there is little will in the Republican Congress to overrule the agency and tie it down to enforcing a net neutrality law enacted by legislators. There is some discussion in technology circles that introduction of 5G wireless service in the next few years will change the competitive landscape since 5G speeds and bandwidth will challenge the monopoly of wired service providers for the crucial last mile of service to customers’ homes. Until now, wireless internet service providers like Verizon and AT&T could not compete with wired providers like Comcast and Charter because their service was slower and not capable of handling the bandwidth demands of home users piling up GigaBytes of usage every month, usually by streaming video.


5G may indeed change the competitive landscape between a few large internet service provider companies as it rolls out, but customers will still have to deal with fast lanes and slow lanes imposed by whichever gatekeeper they sign up with for service. The proposed FCC rule changes will allow ISPs to charge different content providers varying amounts based on tiers of service, rather than providing equal access to all as they are required to do now since they are regulated as public utilities.

Jessica Rosenworcel official photo
FCC Commissioner Jessica Rosenworcel, who began service on the Commission in 2012 and was confirmed by the Senate for an additional term in 2017.

When FCC Chairman Ajit Pai first proposed rolling back net neutrality rules early this year, Comcast said essentially “Trust us, we would never take full advantage of the regulatory opening to charge a premium for faster internet service.” As if anyone would believe them, particularly anyone who had any experience at all as a Comcast customer! Lately Comcast has walked back their earlier statement with some linguistic mumbo-jumbo that’s supposed to make people think they won’t be doing what they intend on doing when the time comes and they can get away with it, which will be to charge a premium for faster internet service and, as a bonus, no data caps! Comcast’s duplicity surprises no one, and their pleas for trust are laughable.

The best thing that can be hoped for by people who wish to keep a relatively open and inexpensive internet beyond December 14 is that the rule changes will be tied up in the courts for several years, and to some extent that will tie the grasping hands of some internet service providers who are eager to take advantage of the new rules to gouge content providers and customers. Beyond that, the best hope for a decisive, long term answer to the problem will have to come from Congress, which in the current environment does not appear possible, but may be so after a change in party dominance in Congress as a result of the 2018 election. The FCC needs to be more an enforcer of rules Congress makes, and less its own rule maker.
― Techly

 

1 5 6 7 8 9 11