Quantcast
Channel: Hacker News
Viewing all 25817 articles
Browse latest View live

First Detection of the 21cm Cosmic Dawn Signal

$
0
0

Title: An absorption profile centered at 78 megahertz in the sky-averaged spectrum

Authors: Judd Bowman, Alan Rogers, Raul Monsalve, Thomas Mozdzen & Nivedita Mahesh

First Author’s Institution: School of Earth and Space Exploration, Arizona State University, Tempe, Arizona

Status: Published in Nature [closed access]

Today’s astrobite is about the exciting detection of the 21cm neutral hydrogen emission during the Cosmic Dawn, a topic covered many times in the past (for example here, here, here, oh and here). The 21cm emission from neutral hydrogen has the ability to open up secrets of the early universe and give us some keen insight into how the first stars and galaxies formed and how the universe became reionized. You may be familiar with the cosmic microwave background (CMB) which has provided us with evidence for some of our most important cosmological understandings due to measurements by the satellites COBE, WMAP, and Planck. In much the same way the Experiment to Detect the Global Epoch of Reionization Signature or EDGES (Figure 1) has now done the same for the period between recombination and reionization. So now let’s jump into why this detection is so amazing and how there may potentially be some new underlying physics at work.

Figure 1: The Experiment to Detect the Epoch of Reionization Signature (EDGES) single antenna radio telescope. Situated in Western Australia at the Murchison Radio Astronomy Observatory.

The Global 21cm neutral hydrogen emission

To get a good understanding of the detection, let’s break down exactly what constitutes the global 21cm neutral hydrogen signal. The 21cm (1420 MHz) emission occurs from the forbidden spin-flip transition of neutral hydrogen, which gets stretched by cosmological redshift to lengths of meters. We say ‘forbidden’ because the time-scale for the probability of a single hydrogen atom undergoing this transition is on the order of megayears. Luckily when trying to observe this emission we are doing so in bulk, (there is a lot of hydrogen in the universe) so it’s not an impossible task. Another important point is that the neutral hydrogen (and also it’s signal) is strongly coupled to the CMB, for example looking to Figure 2 (bottom), neutral hydrogen and the CMB are at the same temperature everywhere that thedifferential brightness temperature is zero.

Figure 2: The global 21cm neutral hydrogen signal over redshift (and frequency) where the top image is the spatially fluctuating 21cm neutral hydrogen and the bottom is the globally averaged 21cm signal. The 21cm signal is strongly coupled to the CMB, which means it is undetectable until the temperature of the neutral hydrogen deviates from the CMB. Borrowed from http://pritchardjr.github.io/research.html.

Ok, so now we have some basics down and we know that the global 21cm signal is just the average of the 21cm signal over large scales. Now what exactly do we need to use to detect this global signal? Can we use a radio interferometer (e.g. HERA, MWA, and LOFAR)? Unfortunately not. Radio interferometers are insensitive to the globally averaged signal, and are better suited for trying to detect the spatial fluctuations (Figure 2 top). You therefore need to use a wideband single antenna radio telescope; and you want it to be wideband because the early global 21cm signature occurs over a redshift range of 13 < z < 27 which corresponds to the frequencies of 50 – 100 MHz.

The Detection

Figure 3: (a) The EDGES sky measurement in units of brightness temperature, showing the strong power-law spectrum due to galactic synchrotron emission. (b) Residuals after removing the power-law dependence. (c) Residuals after removing the power-law synchrotron emissions in addition to a model (d) of the 21cm absorption signal. (e) Residuals from (c) added to model in (d).

The two biggest issues with detecting this faint signal are to do with calibration of the instrument, and galactic synchrotron emission. To try and compensate for introducing false signals added to their measurements due to calibration of the instrument, the author’s separately apply two different calibration techniques. This ensures that a detection seen in one calibrated measurement should be also present in the other differently calibrated measurement. The other problem is due to incredibly bright synchrotron emission, which appears to be almost 4 orders of magnitude larger than the signal! To account for this the authors depend on the fact that these foreground emissions should be smooth over frequency, meaning you can fit and subtract out a low-order polynomial from this measurement and ideally there should be no loss of signal. They fit a 4th-order polynomial and the residuals look like those seen in Figure 3(b). They then simultaneously fit the 4th order polynomial with a model of an expected 21cm signal (for many realizations of a 21cm signal). Their best fit model is demonstrated in Figure 3(d), and the residuals from the combined fit (polynomial + 21cm model) in Figure 3(c). From this measurement they detect an absorption profile centered at 78 MHz (z ~ 17) over 19 MHz with an amplitude of -500 mK. This now leads us to an interesting consequence concerning the amplitude of the absorption, represented by the depth of the troughs in Figures 3(d-e), which is over a factor of 2 larger than originally expected. This is where we can begin to introduce dark matter.

Implications for Dark Matter

Our original understanding of the amplitude for this absorption profile is limited by the minimum temperature of neutral hydrogen that can be achieved by adiabatic cooling due to cosmic expansion. Based on this measurement which appears to be twice as large as expected, we are led to believe there must be an additional mechanism that is cooling the neutral hydrogen below this adiabatic limit (there is another explanation which states that the background radiation temperature could have been hotter but dark matter is more fun). So how does dark matter come into play? In general, for the neutral hydrogen to become cooler it must come into contact with something even colder. This implies that through interactions such as baryons scattering with dark matter particles it can drive down the temperature leading to the larger amplitude absorption profile. These relative scattering velocities also place constraints on important dark matter particle parameters such as the mass and cross-section (check out this primer). By looking at the minimum temperature achieved by cooling from both cosmic expansion and dark matter interactions, theorists (companion dark matter paper released same day) were able to place constraints on both these parameters which give us a cross-section, \sigma \approx 10^{-21} cm^{2} and a particle mass  m_{\chi} , in the ~1 GeV range. Of course all of this should be taken with a healthy skepticism but the idea of using 21cm observations to constrain dark matter is truly promising.

The Future of 21cm Observations

This is most certainly an exciting detection which opens up many more questions than it answers. The next order of business is to confirm the initial detection by EDGES, either by another single antenna global 21cm experiment or by measuring the spatially fluctuating 21cm signal using an interferometer around the same redshift range as EDGES. By getting additional instruments to measure this period, the role of dark matter in cooling baryons in the early universe can either be ruled out or as it appears as of right now provide a useful probe into their detection. Either way, the Cosmic Dawn is hiding many more secrets for us to discover.


Launch HN: Pathrise (YC W18) – Career accelerator for students, free until hired

$
0
0
Hi HN,

I'm Kevin, co-founder of Pathrise (https://www.pathrise.com). Pathrise is an online replacement for career services that helps students get better jobs and make more money. If and only if they get hired during our program, students pay us back a tuition fee of 7% of their income for 1 year.

For more context, you can read about us here: https://venturebeat.com/2018/03/09/pathrise-wants-to-be-the-....

The problem: universities aren't directly incentivized to get students good jobs since they make all their money in upfront tuition. As a result, college career services centers aren't results-driven and can't properly support their students. Most students are essentially left to figure things out on their own, and they think to themselves, career services are useless. The easiest way to verify this is to ask your average student how many times they've visited their career services center in the last year.

In reality, career services (that actually work) are probably one of the highest value things a student can receive. You can take any step of the job search (e.g. online applications), train students on one technique (e.g. lead gen and cold emailing), and produce significant and measurable returns (e.g. we've measured that this technique in particular can 4X response rate from under 5% to over 20%). Pathrise does this with every step of the job-hunting process, from training students from a 2/6 to a 5/6 in technical interviewing scores based on real company rubrics to helping students get a 10%+ higher salary through negotiation.

In this sense, we're kind of like YC for students instead of startups. Founders give 7% equity to YC because they know YC will increase their company's prospects by more than 7%. Students give us 7% of their first year's income, and our program is designed to increase their job prospects by more than 7%. They know we'll do everything in our power to provide them that value because we have aligned incentives - we only make money if they do.

What this ends up looking like is an online accelerator for students that takes place in 12 monthly batches a year, followed by an average of 3-4 months of support until a student is placed. Instead of focusing on a technical education (like our friends at Lambda School), Pathrise is entirely about optimizing your job search. This involves services like resume review, prospecting, referrals, interview preparation, and negotiation advice. Again, unlike career services today, we track every data point so we can hold ourselves accountable to actually produce significant and measurable value for our students.

Thanks for reading! I'd be happy to answer any of your questions and would greatly appreciate your feedback.

LC4: A Low-Tech Authenticated Cipher for Human-To-Human Communication

$
0
0
Cryptology ePrint Archive: Report 2017/339ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human CommunicationAlan KaminskyAbstract: ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans only, and therefore it encrypts and decrypts plaintexts and ciphertexts consisting only of the English letters A through Z plus a few other characters. LC4 uses a nonce in addition to the secret key, and requires that different messages use unique nonces. LC4 performs authenticated encryption, and optional header data can be included in the authentication. This paper defines the LC4 encryption and decryption algorithms, analyzes LC4's security, and describes a simple appliance for computing LC4 by hand.Category / Keywords: secret-key cryptography / low-tech ciphers, authenticated encryptionDate: received 12 Apr 2017Contact author: ark at cs rit eduAvailable format(s): PDF | BibTeX CitationVersion: 20170421:213331 (All versions of this report)Short URL: ia.cr/2017/339Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]

Key Git Concepts Explained the Hard Way

$
0
0

If you’ve ever read a git man page, you’ll know that trying to understand git can be an intimidating experience.

There’s even a git man page generator that produces joke git pages:

If <upstream> is not specified, the upstream configured in
branch.<name>.remote and branch.<name>.merge options will be used 
(see git-config(1) for details) and the --fork-point option is 
assumed. If you are currently not on any branch or if the current
branch does not have a configured upstream, the rebase will abort.
git-land-remote lands some applied remotes over the packed applied
branches, and it is in various cases a possibility that a
filter-branched error must prevent staged cleaning of some named
stages.

One of the above extracts is a joke, one is real…

So here’s five core git concepts explained.

Hopefully after reading this the man pages will start to make more sense. If you’re confused by one I’ve missed, contact me to write it up for you (@ianmiell or LinkedIn).

This post uses the ‘hard way‘ method to teach the concepts by having you type out the commands and think through what’s going on, without having to worry about breaking anything.

I use the same method to teach git in my book Learn Git the Hard Way.    

   learngitthehardway

1) Reference

Many will know this already, but I need to make sure you know it because it’s so fundamental.

A ‘reference’ is a string that points to a commit.

There are four main types of reference: HEAD, Tag, Branch, and Remote Reference

HEAD

HEAD is a special reference that always points to where the git repository is.

If you checked out a branch, it’s pointed to the last commit in that branch. If you checked out a specific commit, it’s pointed to that commit. If you check out at a tag, it’s pointed to the commit of that tag.

Every time you commit, the HEAD reference/pointer is moved from the old to the new commit. This happens automatically, but it’s all going on under the hood.

Tag

A tag is a reference that points to a specific commit. Whatever else happens (and unlike the HEAD), that tag will stay pointed at the commit it was originally pointed at.

Branch

A branch is like a tag, but will move when the HEAD moves.

You can only be on one branch at a time.

Type out these commands and explain what’s going on. Take your time:

$ mkdir lgthw_origin
$ cd lgthw_origin
$ git init
$ echo 1 > afile
$ git add afile
$ git commit -m firstcommit
$ git log --oneline --decorate --all --graph
$ git branch otherbranch
$ git tag firstcommittag
$ git log --oneline --decorate --all --graph
$ echo 2 >> afile
$ git commit -am secondcommit
$ git checkout otherbranch
$ git log --oneline --decorate --all --graph
$ echo 3 >> afile
$ git commit -am thirdcommit
$ git log --oneline --decorate --all --graph

Now do it again and explain to someone else what’s going on.

Remote Reference

A remote reference is a reference to code that’s from another repository. See below for more on that…

2)  ‘Detached Head’

Now that you know what HEAD is, then understanding what a ‘detached head’ is will be much easier.

A ‘detached head’ is a git repository that’s checked out but has no branch associated with it.

Continuing from the above listing, type this in:

$ git checkout firstcommittag

You get that scary message:

Note: checking out 'firstcommit'.

You are in 'detached HEAD' state. You can look around, make experimental
changes and commit them, and you can discard any commits you make in this
state without impacting any branches by performing another checkout.

If you want to create a new branch to retain commits you create, you may
do so (now or later) by using -b with the checkout command again. Example:

git checkout -b <new-branch-name>

HEAD is now at 1b1499c... firstcommit

but if you follow the instructions:

$ git log --oneline --decorate --all --graph
$ git checkout -b firstcommitbranch
$ git log --oneline --decorate --all --graph

you can figure out what’s going on. There was a tag, but no branch at that commit, so the HEAD was detached from a branch.

3) Remote Reference

A remote reference is a reference to a commit on another git repository.

$ cd ..
$ git clone lgthw_origin lgthw_cloned
$ cd lgthw_cloned
$ git remote -v
$ git log --oneline --decorate --all --graph

The log graph looks different doesn’t it?

Compare that to the ​git log output in the other folder and think about how they differ. What word do you see multiple times in the output that you didn’t see before?

The cloned repo has its own copy of the branch (firstcommitbranch) and tag (firstcommit) because that’s where the repository’s HEAD was when you cloned it.

$ git branch -a

shows all the branches visible in this repository, both local and remote.

Compare that to the output of the same command in the original folder. How does it differ?

Now check out your local master:

$ git checkout master

and you get a message saying:

Branch master set up to track remote branch master from origin.Switched to a new branch 'master'

So you’ve got a local reference master which ‘tracks’ the master in the remote repository. The local reference is master, and the remote reference is origin/master. Git assumed you meant your local master to track the remote master.

The two branches look the same, but they are linked only by the configuration of this repository.

$ cd ../lgthw_origin
$ git checkout master$ echo origin_change >> afile$ git commit -am 'Change on the origin'

Then go back to the cloned repository and fetch the changes from the origin:

$ cd ../lgthw_cloned$ git fetch origingit log --oneline --decorate --all --graph

Can you see what happened to your local master branch, and what happened to the origin’s? Why are they now separate?

Note that you didn’t git pull the change. git pull does a fetch and a merge, and we don’t want to confuse here by skipping steps and making it look like magic.

In fact, git pull is best avoided when you are learning git…


If you like this post, you’ll like my book Learn Git the Hard Way

It covers all this and much more in a similar style.

learngitthehardway

4) Fast Forward

Your git log graph should have looked like this:

* 90694b9 (origin/master) Change on the origin* d20fc9a (HEAD -> master) secondcommit
| * 2e7ae21 (origin/otherbranch) thirdcommit
|/ 
* 6c14f2f (tag: firstcommittag, origin/firstcommitbranch, origin/HEAD, firstcommitbranch) firstcommit

(Your ids may differ from the above – otherwise it should be the same.)

Now, do you see how the Change on the origin commit is not branched from your local HEAD/master commit secondcommit – it’s in a ‘straight line’ from the firstcommit tag?

That means that if you ‘merge’ origin/master into your local master, git can figure out that all it needs to do is move the HEAD and master reference to where the origin/master branch is and its ‘merge’ job is done.

$ git merge origin/master
$ git log --oneline --decorate --all --graph

This is all a ‘fast forward’ is: git saw that there’s no need to do any merging, it can just ‘fast forward’ the references to the point you are merging to. Or if you prefer, it just moves the pointers along rather than create a new merge commit.

We just did a git pull, by the way. A git pull consists of a git fetch and a git merge. Breaking it down into these two steps helps reduce the mystery of why things can go wrong.

As an exercise, after finishing this article do the whole exercise again, but make a change to both origin/master and master and then do the fetch and merge to see what happens when a fast-forward is not possible.

5) Rebase

master and origin/master are now in sync, so now run these commands to see what a rebase is:

$ cd ../lgthw_origin $ git status$ echo origin_change_rebase >> afile $ git commit -am 'origin change rebase' $ git log --oneline --decorate --all --graph 

OK so far? You’ve made a change on master on the origin repo:

$ cd ../lgthw_cloned $ echo cloned_change_rebase >> anewfile $ git add anewfile $ git commit -m 'cloned change rebase in anewfile' $ git log --oneline --decorate --all --graph $ git fetch origin $ git log --oneline --decorate --all --graph $ git rebase origin/master $ git log --oneline --decorate --all --graph

Can you see what’s happened?

If not, have a close look at the last two git log outputs.

That’s what a rebase is – it takes a set of commits and moves (or ‘re-bases’) them to another commit.


If you liked this post, you’ll like my book Learn Git the Hard Way

It covers all this and much more in a similar style.

learngitthehardway


If you liked this post, you might also like these:

Create your own Git diagrams

A Git Serverless Pattern

Power Git Log Graphing

Interactive Git Rebase and Bisect Tutorials

Advertisements

Theranos, CEO Holmes, and Former President Balwani Charged with Fraud

$
0
0

The Securities and Exchange Commission today charged Silicon Valley-based private company Theranos Inc., its founder and CEO Elizabeth Holmes, and its former President Ramesh “Sunny” Balwani with raising more than $700 million from investors through an elaborate, years-long fraud in which they exaggerated or made false statements about the company’s technology, business, and financial performance.  Theranos and Holmes have agreed to resolve the charges against them.  Importantly, in addition to a penalty, Holmes has agreed to give up majority voting control over the company, as well as to a reduction of her equity which, combined with shares she previously returned, materially reduces her equity stake.

The complaints allege that Theranos, Holmes, and Balwani made numerous false and misleading statements in investor presentations, product demonstrations, and media articles by which they deceived investors into believing that its key product – a portable blood analyzer – could conduct comprehensive blood tests from finger drops of blood, revolutionizing the blood testing industry.  In truth, according to the SEC’s complaint, Theranos’ proprietary analyzer could complete only a small number of tests, and the company conducted the vast majority of patient tests on modified and industry-standard commercial analyzers manufactured by others.

The complaints further charge that Theranos, Holmes, and Balwani claimed that Theranos’ products were deployed by the U.S. Department of Defense on the battlefield in Afghanistan and on medevac helicopters and that the company would generate more than $100 million in revenue in 2014.  In truth, Theranos’ technology was never deployed by the U.S. Department of Defense and generated a little more than $100,000 in revenue from operations in 2014.

“Investors are entitled to nothing less than complete truth and candor from companies and their executives,” said Steven Peikin, Co-Director of the SEC’s Enforcement Division.  “The charges against Theranos, Holmes, and Balwani make clear that there is no exemption from the anti-fraud provisions of the federal securities laws simply because a company is non-public, development-stage, or the subject of exuberant media attention.”

“As a result of Holmes’ alleged fraudulent conduct, she is being stripped of control of the company she founded, is returning millions of shares to Theranos, and is barred from serving as an officer or director of a public company for 10 years,” said Stephanie Avakian, Co-Director of the SEC’s Enforcement Division.  “This package of remedies exemplifies our efforts to impose tailored and meaningful sanctions that directly address the unlawful behavior charged and best remedies the harm done to shareholders.”

“The Theranos story is an important lesson for Silicon Valley,” said Jina Choi, Director of the SEC’s San Francisco Regional Office.  “Innovators who seek to revolutionize and disrupt an industry must tell investors the truth about what their technology can do today, not just what they hope it might do someday.”

Theranos and Holmes have agreed to settle the fraud charges levied against them.  Holmes agreed to pay a $500,000 penalty, be barred from serving as an officer or director of a public company for 10 years, return the remaining 18.9 million shares that she obtained during the fraud, and relinquish her voting control of Theranos by converting her super-majority Theranos Class B Common shares to Class A Common shares.  Due to the company’s liquidation preference, if Theranos is acquired or is otherwise liquidated, Holmes would not profit from her ownership until – assuming redemption of certain warrants – over $750 million is returned to defrauded investors and other preferred shareholders.  The settlements with Theranos and Holmes are subject to court approval.  Theranos and Holmes neither admitted nor denied the allegations in the SEC’s complaint.  The SEC will litigate its claims against Balwani in federal district court in the Northern District of California.

The SEC’s investigation was conducted by Jessica Chan, Rahul Kolhatkar, and Michael Foley and supervised by Monique Winkler and Erin Schneider in the San Francisco Regional Office.  The SEC’s litigation will be led by Jason Habermeyer and Marc Katz of the San Francisco office.

Checked C: extension to C that adds static and dynamic checking

$
0
0

README.md

Checked C is an extension to C that adds static and dynamic checking to detect or prevent common programming errors such as buffer overruns, out-of-bounds memory accesses, and incorrect type casts. This repo contains the specification for the extension, test code, and samples. For the latest version of the specification and the draft of the next version, see the Checked C releases page.

We are creating a modified version of LLVM/clang that supports Checked C. The code for the modified version of LLVM/clang lives in theChecked C clang repo and the Checked C LLVM repo.

You can join the mailing lists for announcements and weekly status updates about the project. There are a variety of ways to get involved in the project, including opening issues, contributing changes to the specification, or helping out with the compiler and tools implementation. See contributing for more information.

The software in this repository is covered by the MIT license. See the file LICENSE.TXT for the license. The Checked C specification is made available by Microsoft under the OpenWeb Foundation Final Specification Agreement, version 1.0. Contributions of code to the Checked LLVM/clang repos are subject to the CLANG/LLVM licensing terms.

This project has adopted theMicrosoft Open Source Code of Conduct. For more information see theCode of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

No Alcohol, No Coffee for 27 Months. This Is What Happened

$
0
0

Exactly today (Dec. 26th 2016) I haven’t had a single drop of alcohol or coffee in 27 months. If you're reading this later, you can do the math yourself.

A couple of my friends on Facebook & Twitter asked me to write about my experience, so here it is, in a nutshell.

With over a year of no alcohol & coffee, I did notice some side effects. Here is what I learned.

I save $1000 every month

After 2 months I noticed that I had $1000 more on my bank account. Yes, that’s a lot, but do the math and you notice it’s not that much.

I live in New York. In order to spend $1000 on alcohol I only have to spend $33 everyday. Assume that I have 2–3 cocktails every other day (which are $10 each without tip), including some wine bottles every month for at home I can easily spend $1000.

Some might think that this is heavy alcoholism, but trust me when I say that having 1–2 drinks everyday in New York is more than normal.

Also, going out drinking means that the occasional dinner & snacks are more frequent. You don’t just drink, you get hungry and buy some food. And before you noticed it, you spend $1000.

Less gossip

If there is one thing I noticed quite early, then it’s the lack of social interaction my new diet brought with it. Here is what happened:

  • You don’t really go out anymore. It’s exhausting to explain again and again why you don’t drink and NO also one drink is not okay.
    When a group of people asks me to join them for drinks, I mostly default to answer with NO because I just don’t want to deal with gossip as a sober person.
  • If I do go for drinks, I last max. 1 hour because this is how long my attention span as a sober person lasts in a group of drunk people.
  • While I was never a party animal anyways, completely stopping with alcohol made me go out even less. It’s amazing to see the culture of drinking slowly fading away from your life. It made me realize how many friendships are actually based mostly on your drinking habits.

“Let’s go for a drink” is so engraved in our lives, because who says “Hey, let’s just meet up as sober people and talk about stuff” — Why the fuck would you do that? “Let’s get a drink” needs no explanation. It’s a thing, everyone knows what happens next.

My sleep quality increased

Removing alcohol from my diet increased my sleep quality drastically. And I’m not talking about “falling asleep” but the actual sleep quality.

You sure do fall asleep easier with 1–2 glasses of beer or wine, but the actual sleep quality might suffer. I sleep better, and I wake up with more energy. Before I always ruined my mornings, even if I only had two beers at night I could feel it in the morning. (if you’re in your early twenties, ignore this, it doesn’t affect you yet)

No coffee, less panic, less stress

This might be something more personal and not related to everyone. But removing coffee from my diet helped me become more relaxed. Coffee always made me stressed out. It increased my chance of having anxiety and also fucked up my digestion. Removing coffee/caffeine from my diet not only made me more relaxed, I also poop like a king.

Besides that, I love the smell and taste of coffee. An occasional decaf will do the trick. In the summer I now drink ice tea, in the winter regular tea.
I found out that “Going for a coffee” turned out to be more of a social activity than the actual craving for coffee. Keep the social habit, replace coffee with something else.

__

Overall, I’m very happy about my decision and have no desire to start drinking again. I’m also not telling you to do the same, if you’re happy with how things are going, don’t change anything.

I changed my habits out of curiosity and I like how it turned out.

PS: Before someone asks. I do not smoke cigarettes. I also don’t smoke weed. I also don’t take any drugs whatsoever. (I have Internet, that’s addiction enough for me)

Yours truly,
Tobias

Fallout 3 in Fallout 4 mod cancelled due to voice acting copyright

$
0
0

Today I have some sad news for you, the community. Recently we have communicated with Bethesda regarding our planned method to implement the voice acting and other audio from Fallout 3 Into the Capital Wasteland. During this Conversation it became clear our planned approach would raise some serious red flags that we had unfortunately not foreseen .This contact resulted in us changing our methods to attempt to continue working.

After some thought it appears there is no fully Legal way for us to continue developing the Fallout 3 in Fallout 4 Portion of The Capital Wasteland. Projects like these have always existed in a Gray area of the law but we as a team value our connections with many members of the amazing dev team that is Bethesda Game studios.

To Reinforce my point, The Laws around this have not changed. If we were to continue and complete Fallout 3 in Fallout 4 Legally I as the project lead would most probably be Liable for any acts of Piracy and Copyright infringement resulting from the projects release. My self and the Road to Liberty team do not wish to strain the working relationships with other members of the community and Bethesda.

At first we were very reluctant to halt work and decided to start looking into Re recording all the Voice acting. We quickly realised we would have to replace iconic voices like Liam Neeson, Malcom McDowell,Ron Perlman and of course the phenomenal Eric Todd Dellums. Without some of these voices fallout 3 looses its charm and personally I cant bring my self to replace Them.

If at any point in the future it becomes fully legal for us to continue working with the blessing of Bethesda and Zenimax we will.

This decision was not taken lightly and it pains many people on my team including my self to have to halt development of the Fallout 3 Story. I personally would like to apologise to the many members of the community that love Fallout 3 as much as I do. Im sorry we couldn't accomplish our dream.


Apple Watch adoption numbers

$
0
0
Apple Watch adoption numbers - Six Colors

by Jason Snell & Dan Moren

Linked by Jason Snell

David Smith has some data from how his apps are used on Apple Watch:

I’ve been watching the Apple Watch adoption curve within my apps (specifically Pedometer++ for this analysis) quite carefully. My personal hope is that this summer when we get watchOS 5 it will drop support for the Series 0 and free Apple to really push forward on what is possible for developers. But in order for that wish to be realistic I imagine Apple will need the daily use of those first watches to have died down significantly….

So far the data is looking promising that this dream of mine might actually be possible. The Series 3 is being adopted incredibly quickly and just last week became the most popular Apple Watch overall amongst my users with 33% of the overall user-base. The Series 0 is steadily falling, currently at around 24%.

My wife has a stainless steel Series 0, and it still works pretty well (though it’s slow to kick off a workout). I wonder if this fall she’ll be getting a new one…



Introduction to Recurrent Neural Networks in Pytorch

$
0
0

This tutorial is intended for someone who wants to understand how Recurrent Neural Network works, no prior knowledge about RNN is required. We will implement the most simple RNN model – Elman Recurrent Neural Network. To get a better understanding of RNNs, we will build it from scratch using Pytorch tensor package and autograd library.

I assume that you have some understanding of feed-forward neural network if you are new to Pytorch and autograd library checkout my tutorial.

Elman Recurrent Neural Network

An Elman network was introduced by Jeff Elman, and was first published in a paper entitled Finding structure in time It’s just a  three-layer feed-forward network, in our case, input layer consist of one input neuron \(x_{1}\)  and additional units called context neurons \(c_{1}\) … \(c_{n}\). Context neurons receive input from the hidden layer neurons, from previous time step. We have one context neuron per neuron in the hidden layer. Since the state from previous time step is provided as a part of the input, we can say that network has a form of memory, context neurons represent a memory.

Predicting the sine wave

We will train our RNN to learn sine function. During training we will be feeding our model with one data point at a time, that is why we need only input neuron  \(x_{1}\), and we want to predict the value at next time step. Our input sequence x consists of 20 data points, and the target sequence is the same as the input sequence but it ‘s shifted by one-time step into the future.

Implementing the model

We start by importing the necessary packages.

Next, we’ll set the model hyperparameters,  the size of the input layer is set to 7, which means that we will have 6 context neurons and 1 input neuron, seq_length defines the length of our input and target sequence.

Now we will generate the training data, where x is an input sequence and y is a target sequence.

We need to create two weight matrices, w1 of size (input_size, hidden_size) for input to hidden connections, and a w2 matrix of size (hidden_size, output_size) for hidden to output connection. Weights are initialized using a normal distribution with zero mean.

We can now define forward pass method, it takes input vector x, context_state vector and two weights matrices as arguments. We will create vector xh by concatenating input vector x with the context_state vector. We perform dot product between the xh vector and weight matrix w1, then apply tanh function as nonlinearity, which works better with RNN than sigmoid. Then we perform another dot product between new context_state and weight matrix w2. We want to predict continuous value, so we do not apply any nonlinearity at this stage.

Note that context_state vector will be used to populate context neurons at the next time step. That is why we return context_state vector along with the output of the network.

This is where the magic happens, context_state vector summarizes the history of the sequence it has seen so far.

Training

Our training loop will be structured as follows.

  • The outer loop iterates over each epoch. Epoch is defined as one pass of all training data.  At the beginning of each epoch, we need to initialize our context_state vector with zeros.
  • The inner loop runs through each element of the sequence. We run forward method to perform forward pass which returns prediction and context_state which will be used for next time step. Then we compute Mean Square Error (MSE),  which is a natural choice when we want to predict continuous values.  By running backward() method on the loss we calculating gradients, then we update the weights. We’re supposed to clear the gradients at each iteration by calling zero_() method otherwise gradients will be accumulated. The last thing we do is wrapping context_state vector in new Variable, to detach it from its history.

The output generated during training shows how the loss is decreasing with every epoch, which is a good sign. Decaying loss means that our model is learning.

Epoch: 0 loss 2.777482271194458
Epoch: 10 loss 0.10264662653207779
Epoch: 20 loss 0.1178232803940773

Epoch: 280 loss 0.005524573381990194
Epoch: 290 loss 0.005174985621124506

Making Predictions

Once our model is trained, we can make predictions, at each step of the sequence we will feed the model with single data point and ask the model to predict one value at the next time step.

As you can see, our model did a pretty good job.

Conclusion

In this post we’ve implemented a basic RNN model from scratch using Pytorch. We learn how to apply RNN to simple sequence prediction problem. The full code is available on Github.

California's other drought: a major earthquake is overdue

$
0
0

California earthquakes are a geologic inevitability. The state straddles the North American and Pacific tectonic plates and is crisscrossed by the San Andreas and other active fault systems. The magnitude 7.9 earthquake that struck off Alaska’s Kodiak Island on Jan. 23, 2018 was just the latest reminder of major seismic activity along the Pacific Rim. Tragic quakes that occurred in 2017 near the Iran-Iraq border and in central Mexico, with magnitudes of 7.3 and 7.1, respectively, are well within the range of earthquake sizes that have a high likelihood of occurring in highly populated parts of California during the next few decades.

california next big quake, big one california, california big one preparedness, california big one next
Fires after the San Francisco earthquake of 1906. Photo: USGS

The earthquake situation in California is actually more dire than people who aren’t seismologists like myself may realize. Although many Californians can recount experiencing an earthquake, most have never personally experienced a strong one. For major events, with magnitudes of 7 or greater, California is actually in an earthquake drought. Multiple segments of the expansive San Andreas Fault system are now sufficiently stressed to produce large and damaging events.

The good news is that earthquake readiness is part of the state’s culture, and earthquake science is advancing – including much improved simulations of large quake effects and development of an early warning system for the Pacific coast.

The last big one

California occupies a central place in the history of seismology. The April 18, 1906 San Francisco earthquake (magnitude 7.8) was pivotal to both earthquake hazard awareness and the development of earthquake science – including the fundamental insight that earthquakes arise from faults that abruptly rupture and slip. The San Andreas Fault slipped by as much as 20 feet (six meters) in this earthquake.

Although ground-shaking damage was severe in many places along the nearly 310-mile (500-kilometer) fault rupture, much of San Francisco was actually destroyed by the subsequent fire, due to the large number of ignition points and a breakdown in emergency services. That scenario continues to haunt earthquake response planners. Consider what might happen if a major earthquake were to strike Los Angeles during fire season.

california next big quake, big one california, california big one preparedness, california big one next
Destruction after the Northridge earthquake in Los Angeles in 1994. Photo: Robert A. Eplett/FEMA

Seismic science

When a major earthquake occurs anywhere on the planet, modern global seismographic networks and rapid response protocols now enable scientists, emergency responders and the public to assess it quickly – typically, within tens of minutes or less – including location, magnitude, ground motion and estimated casualties and property losses. And by studying the buildup of stresses along mapped faults, past earthquake history, and other data and modeling, we can forecast likelihoods and magnitudes of earthquakes over long time periods in California and elsewhere.

However, the interplay of stresses and faults in the Earth is dauntingly chaotic. And even with continuing advances in basic research and ever-improving data, laboratory and theoretical studies, there are no known reliable and universal precursory phenomena to suggest that the time, location and size of individual large earthquakes can be predicted.

Major earthquakes thus typically occur with no immediate warning whatsoever, and mitigating risks requires sustained readiness and resource commitments. This can pose serious challenges, since cities and nations may thrive for many decades or longer without experiencing major earthquakes.

California’s earthquake drought

The 1906 San Francisco earthquake was the last quake greater than magnitude 7 to occur on the San Andreas Fault system. The inexorable motions of plate tectonics mean that every year, strands of the fault system accumulate stresses that correspond to a seismic slip of millimeters to centimeters. Eventually, these stresses will be released suddenly in earthquakes.

But the central-southern stretch of the San Andreas Fault has not slipped since 1857, and the southernmost segment may not have ruptured since 1680. The highly urbanized Hayward Fault in the East Bay region has not generated a major earthquake since 1868.

Reflecting this deficit, the Uniform California Earthquake Rupture Forecast estimates that there is a 93 percent probability of a 7.0 or larger earthquake occurring in the Golden State region by 2045, with the highest probabilities occurring along the San Andreas Fault system.

california next big quake, big one california, california big one preparedness, california big one next
California’s major faults, showing forecast probabilities estimated by the third Uniform California Earthquake Rupture Forecast. The color bar shows the estimated percent likelihood of a magnitude 6.7 or larger earthquake during the next 30 years, as of 2014. Note that nearly the entire San Andreas Fault system is red on the likelihood scale due to the deficit of large earthquakes during and prior to the past century. Map: USGS

Can California do more?

California’s population has grown more than 20-fold since the 1906 earthquake and currently is close to 40 million. Many residents and all state emergency managers are widely engaged in earthquake readiness and planning. These preparations are among the most advanced in the world.

For the general public, preparations include participating in drills like the Great California Shakeout, held annually since 2008, and preparing for earthquakes and other natural hazards with home and car disaster kits and a family disaster plan.

Nonetheless, California’s infrastructure, response planning and general preparedness will doubtlessly be tested when the inevitable and long-delayed “big ones” occur along the San Andreas Fault system. Ultimate damage and casualty levels are hard to project, and hinge on the severity of associated hazards such as landslides and fires.

Several nations and regions now have or are developing earthquake early warning systems, which use early detected ground motion near a quake’s origin to alert more distant populations before strong seismic shaking arrives. This permits rapid responses that can reduce infrastructure damage. Such systems provide warning times of up to tens of seconds in the most favorable circumstances, but the notice will likely be shorter than this for many California earthquakes.

Here a simulation of the most likely scenario and effects for the next big earthquake (M7.8) in Southern California:

Early warning systems are operational now in Japan, Taiwan, Mexico and Romania. Systems in California and the Pacific Northwest are presently under development with early versions in operation. Earthquake early warning is by no means a panacea for saving lives and property, but it represents a significant step toward improving earthquake safety and awareness along the West Coast.

Managing earthquake risk requires a resilient system of social awareness, education and communications, coupled with effective short- and long-term responses and implemented within an optimally safe built environment. As California prepares for large earthquakes after a hiatus of more than a century, the clock is ticking.

Yes, get ready and be prepared the the next Big Ones!

Follow us: Facebook and Twitter

The Conversation

Equifax CIO Put ‘2 and 2 Together’ Then Sold Stock, SEC Says

$
0
0

The text from the Equifax Inc. executive sounded ominous: “We may be the one breached.”

Yet before the wider world learned of the credit bureau’s massive hack -- in which sensitive information for more than 140 million U.S. consumers had been compromised -- the executive, Jun Ying, was selling Equifax stock, federal authorities now say.

Six months after the cyberattack shook Equifax and raised questions about suspicious trading by several executives there, the Department of Justice on Wednesday charged Ying with insider trading. Prosecutors say he searched on the internet for what might happen to Equifax stock when the news of the attack broke, then exercised all of his stock options. The move netted him more than $480,000. Ying’s lawyers, Douglas I. Koff and Craig S. Warkol of Schulte Roth & Zabel, declined to comment on Ying’s behalf.

Wednesday’s announcement marks the first criminal charge brought in one of the largest data breaches in history. Ying, the former chief information officer for Equifax’s U.S. information-solutions business, used confidential information entrusted to him by the company to determine it had been hacked, according to a separate complaint filed by the Securities and Exchange Commission.

Equifax interim Chief Executive Officer Paulino do Rego Barros said in a statement Wednesday that the company reviewed Ying’s trading and, after concluding he violated the firm’s policies, reported its findings to government authorities. “We are fully cooperating with the DOJ and the SEC, and will continue to do so,” Barros said.

Sale Timeline

Ying, 42, lives in Atlanta and worked at Equifax from 2013 until last October. On Friday, Aug. 25, he received an email asking him to handle breach remediation for an internal project code-named Sparta. The email stated that Equifax’s global consumer-solutions business was working on a “VERY large breach opportunity” and that the request was “extremely time sensitive,” according to the SEC’s complaint.

Hours after receiving the initial email, Ying was invited to a mandatory conference call. While he didn’t initially join the call, one of his direct reports did, the SEC said. That person texted Ying that he’d been asked to help prepare the IT applications they oversaw to handle roughly 10 million customers. Ying then joined the conference call, initially resisting the requests to assist on the project.

When Ying talked privately with his supervisor, the manager’s message was cryptic: He told Ying he didn’t need to know why he had to comply with Project Sparta at that time, but at some point he would come to understand what was happening.

Ying then texted the direct report, according to the complaint. “Sounds bad. We may be the one breached,” he wrote. “Starting to put 2 and 2 together.”

The following Monday, he conducted web searches about the impact of Experian Plc’s 2015 data breach on its stock price, the agency found. Hours later, Ying exercised all of his available stock options, resulting in him receiving 6,815 shares of Equifax stock. He then sold the stock for more than $950,000.

Equifax’s Plunge

The following week, Equifax disclosed the cyberattack. The hack has shaken confidence in the Atlanta-based company, which faces more than 240 class-action lawsuits and more than 60 regulatory or government inquiries.

For more on cybersecurity, check out the Decrypted podcast: 

Equifax stock plunged in the days after the breach was disclosed. Ying, who was next in line to become the company’s global CIO, avoided more than $117,000 of losses by selling his shares, the SEC said.

In its complaint, the SEC said Equifax offered Ying the job of global CIO on Sept. 15. The company then rescinded the promotion after senior executives learned of his stock trading. Equifax concluded on Oct. 16 that Ying had violated the company’s insider-trading policy and that he should be terminated, prompting his resignation, the SEC said.

In September, Justice opened a criminal investigation into whether top officials at Equifax had violated insider trading laws before the breach was disclosed. Three Equifax Inc. senior executives -- Chief Financial Officer John Gamble, and unit presidents Joseph Loughran and Rodolfo Ploder -- sold shares worth almost $1.8 million in the days after the company discovered the breach. Equifax has said those three executives had not been informed of the incident when they initiated the sales.

Ying’s stock sale hadn’t been previously reported because he wasn’t a named executive officer.

— With assistance by Anders Melin

Life as a Nonviolent Psychopath (2014)

$
0
0

In 2005, James Fallon's life started to resemble the plot of a well-honed joke or big-screen thriller: A neuroscientist is working in his laboratory one day when he thinks he has stumbled upon a big mistake. He is researching Alzheimer's and using his healthy family members' brain scans as a control, while simultaneously reviewing the fMRIs of murderous psychopaths for a side project. It appears, though, that one of the killers' scans has been shuffled into the wrong batch.

The scans are anonymously labeled, so the researcher has a technician break the code to identify the individual in his family, and place his or her scan in its proper place. When he sees the results, however, Fallon immediately orders the technician to double check the code. But no mistake has been made: The brain scan that mirrors those of the psychopaths is his own.

After discovering that he had the brain of a psychopath, Fallon delved into his family tree and spoke with experts, colleagues, relatives, and friends to see if his behavior matched up with the imaging in front of him. He not only learned that few people were surprised at the outcome, but that the boundary separating him from dangerous criminals was less determinate than he presumed. Fallon wrote about his research and findings in the book The Psychopath Inside: A Neuroscientist's Personal Journey Into the Dark Side of the Brain, and we spoke about the idea of nature versus nurture, and what—if anything—can be done for people whose biology might betray their behavior.


One of the first things you talk about in your book is the often unrealistic or ridiculous ways that psychopaths are portrayed in film and television. Why did you decide to share your story and risk being lumped in with all of that?

I'm a basic neuroscientist—stem cells, growth factors, imaging geneticsthat sort of thing. When I found out about my scan, I kind of let it go after I saw that the rest of my family's were quite normal. I was worried about Alzheimer’s, especially along my wife’s side, and we were concerned about our kids and grandkids. Then my lab was busy doing gene discovery for schizophrenia and Alzheimer's and launching a biotech start-up from our research on adult stem cells. We won an award and I was so involved with other things that I didn't actually look at my results for a couple of years.

This personal experience really had me look into a field that I was only tangentially related to, and burnished into my mind the importance of genes and the environment on a molecular level. For specific genes, those interactions can really explain behavior. And what is hidden under my personal story is a discussion about the effect of bullying, abuse, and street violence on kids.

You used to believe that people were roughly 80 percent the result of genetics, and 20 percent the result of their environment. How did this discovery cause a shift in your thinking?

I went into this with the bias of a scientist who believed, for many years, that genetics were very, very dominant in who people are—that your genes would tell you who you were going to be. It's not that I no longer think that biology, which includes genetics, is a major determinant; I just never knew how profoundly an early environment could affect somebody.

While I was writing this book, my mother started to tell me more things about myself. She said she had never told me or my father how weird I was at certain points in my youth, even though I was a happy-go-lucky kind of kid. And as I was growing up, people all throughout my life said I could be some kind of gang leader or Mafioso don because of certain behavior. Some parents forbade their children from hanging out with me. They'd wonder how I turned out so well—a family guy, successful, professional, never been to jail and all that.

I asked everybody that I knew, including psychiatrists and geneticists that have known me for a long time, and knew my bad behavior, what they thought. They went through very specific things that I had done over the years and said, "That’s psychopathic." I asked them why they didn’t tell me and they said, "We did tell you. We've all been telling you." I argued that they had called me "crazy," and they all said, "No. We said you're psychopathic."

I found out that I happened to have a series of genetic alleles, "warrior genes," that had to do with serotonin and were thought to be at risk for aggression, violence, and low emotional and interpersonal empathy—if you're raised in an abusive environment. But if you're raised in a very positive environment, that can have the effect of offsetting the negative effects of some of the other genes.

Courtesy James Fallon

I had some geneticists and psychiatrists who didn't know me examine me independently, and look at the whole series of disorders I've had throughout my life. None of them have been severe; I’ve had the mild form of things like anxiety disorder and OCD, but it lined up with my genetics.

The scientists said, "For one, you might never have been born." My mother had miscarried several times and there probably were some genetic errors. They also said that if I hadn’t been treated so well, I probably wouldn’t have made it out of being a teenager. I would have committed suicide or have gotten killed, because I would have been a violent guy.

How did you react to hearing all of this?

I said, "Well, I don't care." And they said, "That proves that you have a fair dose of psychopathy." Scientists don't like to be wrong, and I’m narcissistic so I hate to be wrong, but when the answer is there before you, you have to suck it up, admit it, and move on. I couldn't.

I started reacting with narcissism, saying, "Okay, I bet I can beat this. Watch me and I'll be better." Then I realized my own narcissism was driving that response. If you knew me, you'd probably say, "Oh, he's a fun guy"–or maybe, "He's a big-mouth and a blowhard narcissist"—but I also think you'd say, "All in all, he's interesting, and smart, and okay." But here's the thing—the closer to me you are, the worse it gets. Even though I have a number of very good friends, they have all ultimately told me over the past two years when I asked them—and they were consistent even though they hadn’t talked to each other—that I do things that are quite irresponsible. It’s not like I say, Go get into trouble. I say, Jump in the water with me.

What's an example of that, and how do you come back from hurting someone in that way?

For me, because I need these buzzes, I get into dangerous situations.Years ago, when I worked at the University of Nairobi Hospital, a few doctors had told me about AIDS in the region as well as the Marburg virus. They said a guy had come in who was bleeding out of his nose and ears, and that he had been up in the Elgon, in the Kitum Caves. I thought, "Oh, that’s where the elephants go," and I knew I had to visit. I would have gone alone, but my brother was there. I told him it was an epic trek to where the old matriarch elephants went to retrieve minerals in the caves, but I didn't mention anything else.

When we got there, there was a lot of rebel activity on the mountain, so there was nobody in the park except for one guard. So we just went in. There were all these rare animals and it was tremendous, but also, this guy had died from Marburg after being here, and nobody knew exactly how he’d gotten it. I knew his path and followed it to see where he camped.

That night, we wrapped ourselves around a fire because there were lions and all these other animals. We were jumping around and waving sticks on fire at the animals in the absolute dark. My brother was going crazy and I joked, "I have to put my head inside of yours because I have a family and you don’t, so if a lion comes and bites one of our necks, it’s gotta be you."

Again, I was joking around, but it was a real danger. The next day, we walked into the Kitum Caves and you could see where rocks had been knocked over by the elephants.  There was also the smell of all of this animal dung—and that’s where the guy got the Marburg; scientists didn't know whether it was the dung or the bats.

A bit later, my brother read an article in The New Yorker about Marburg, which inspired the movie Outbreak. He asked me if I knew about it. I said, "Yeah. Wasn’t it exciting? Nobody gets to do this trip." And he called me names and said, "Not exciting enough. We could've gotten Marburg; we could have gotten killed every two seconds." All of my brothers have a lot of machismo and brio; you’ve got to be a tough guy in our family. But deep inside, I don't think that my brother fundamentally trusts me after that. And why should he, right? To me, it was nothing.

After all of this research, I started to think of this experience as an opportunity to do something good out of being kind of a jerk my entire life. Instead of trying to fundamentally change—because it’s very difficult to change anything—I wanted to use what could be considered faults, like narcissism, to an advantage; to do something good.

What has that involved?

I started with simple things of how I interact with my wife, my sister, and my mother. Even though they’ve always been close to me, I don't treat them all that well. I treat strangers pretty well—really well, and people tend to like me when they meet me—but I treat my family the same way, like they're just somebody at a bar. I treat them well, but I don't treat them in a special way. That’s the big problem.

I asked them thisit's not something a person will tell you spontaneously—but they said, "I give you everything. I give you all this love and you really don’t give it back." They all said it, and that sure bothered me. So I wanted to see if I could change. I don't believe it, but I'm going to try.

In order to do that, every time I started to do something, I had to think about it, look at it, and go: No. Don’t do the selfish thing or the self-serving thing. Step-by-step, that's what I’ve been doing for about a year and a half and they all like it. Their basic response is: We know you don’t really mean it, but we still like it.

I told them, "You’ve got to be kidding me. You accept this? It’s phony!" And they said, "No, it’s okay. If you treat people better it means you care enough to try." It blew me away then and still blows me away now.

But treating everyone the same isn't necessarily a bad thing, is it? Is it just that the people close to you want more from you?

Yes. They absolutely expect and demand more. It's a kind of cruelty, a kind of abuse, because you're not giving them that love. My wife to this day says it's hard to be with me at parties because I've got all these people around me, and I'll leave her or other people in the cold. She is not a selfish person, but I can see how it can really work on somebody.

I gave a talk two years ago in India at the Mumbai LitFest on personality disorders and psychopathy, and we also had a historian from Oxford talk about violence against women in terms of the brain and social development. After it was over, a woman came up to me and asked if we could talk. She was a psychiatrist but also a science writer and said, "You said that you live in a flat emotional world—that is, that you treat everybody the same. That’s Buddhist." I don't know anything about Buddhism but she continued on and said, "It's too bad that the people close to you are so disappointed in being close to you. Any learned Buddhist would think this was great." I don't know what to do with that.

Sometimes the truth is not just that it hurts, but that it's just so disappointing. You want to believe in romance and have romance in your life—even the most hardcore, cold intellectual wants the romantic notion. It kind of makes life worth living. But with these kinds of things, you really start thinking about what a machine it means we are—what it means that some of us don't need those feelings, while some of us need them so much. It destroys the romantic fabric of society in a way.

So what I do, in this situation, is think: How do I treat the people in my life as if I'm their son, or their brother, or their husband? It's about going the extra mile for them so that they know I know this is the right thing to do. I know when the situation comes up, but my gut instinct is to do something selfish. Instead, I slow down and try to think about it. It's like dumb behavioral modification; there’s no finesse to this, but I said, well, why does there have to be finesse? I’m trying to treat it as a straightaway thing, when the situation comes up, to realize there’s a chance that I might be wrong, or reacting in a poor way, or without any sort of love—like a human.

A few years ago there was an article in The New York Times called, "Can You Call a 9-Year-Old a Psychopath?" The subject was a boy named Michael whose family was concerned about him—he'd been diagnosed with several disorders and eventually deemed a possible psychopath by Dan Waschbusch, a researcher at Florida International University who studies "callous unemotional children." Dr. Waschbusch examines these children in hopes of finding possible treatment or rehabilitation. You mentioned earlier that you don't believe people can fundamentally change; what is your take on this research?

In the '70s, when I was still a post-doc student and a young professor, I started working with some psychiatrists and neurologists who would tell me that they could identify a probable psychopath when he or she was only 2 or 3 years old. I asked them why they didn't tell the parents and they said, "There's no way I’m going to tell anybody. First of all, you can't be sure; second of all, it could destroy the kid’s life; and third of all, the media and the whole family will be at your door with sticks and knives." So, when Dr. Waschbusch came out two years ago, it was like, "My god. He actually said it." This was something that all psychiatrists and neurologists in the field knew—especially if they were pediatric psychologists and had the full trajectory of a kid's life. It can be recognized very, very early—certainly before 9-years-old—but by that time the question of how to un-ring the bell is a tough one.

My bias is that even though I work in growth factors, plasticity, memory, and learning, I think the whole idea of plasticity in adults—or really after puberty—is so overblown. No one knows if the changes that have been shown are permanent and it doesn't count if it's only temporary. It's like the Mozart Effect—sure, there are studies saying there is plasticity in the brain using a sound stimulation or electrical stimulation, but talk to this person in a year or two. Has anything really changed? An entire cottage industry was made from playing Mozart to pregnant women's abdomens. That's how the idea of plasticity gets out of hand. I think people can change if they devote their whole life to the one thing and stop all the other parts of their life, but that's what people can't do. You can have behavioral plasticity and maybe change behavior with parallel brain circuitry, but the number of times this happens is really rare.

So I really still doubt plasticity. I'm trying to do it by devoting myself to this one thing—to being a nice guy to the people that are close to me—but it's a sort of game that I’m playing with myself because I don't really believe it can be done, and it's a challenge.

In some ways, though, the stakes are different for you because you're not violent—and isn't that the concern? Relative to your own life, your attempts to change may positively impact your relationships with your friends, family, and colleagues. But in the case of possibly violent people, they may harm others.

The jump from being a "prosocial" psychopath or somebody on the edge who doesn't act out violently, to someone who really is a real, criminal predator is not clear. For me, I think I was protected because I was brought up in an upper-middle-class, educated environment with very supportive men and women in my family. So there may be a mass convergence of genetics and environment over a long period of time. But what would happen if I lost my family or lost my job; what would I then become? That's the test.

For people who have the fundamental biology—the genetics, the brain patterns, and that early existence of trauma—first of all, if they're abused they're going to be pissed off and have a sense of revenge: I don't care what happens to the world because I'm getting even. But a real, primary psychopath doesn't need that. They're just predators who don’t need to be angry at all; they do these things because of some fundamental lack of connection with the human race, and with individuals, and so on.

Someone who has money, and sex, and rock and roll, and everything they want may still be psychopathic—but they may just manipulate people, or use people, and not kill them. They may hurt others, but not in a violent way. Most people care about violence—that's the thing. People may say, "Oh, this very bad investment counselor was a psychopath"—but the essential difference in criminality between that and murder is something we all hate and we all fear. It just isn't known if there is some ultimate trigger.

And though there isn't an absolute "fix," you talk about the importance of the "fourth trimester"—the months following a baby's birth when bonding is key. What are other really crucial moments where you can see how someone may be at risk, or where this convergence of genetics and environment might be crucial for intervention, or at least identifying what is happening?

There are some critical periods in human development. For the epigenome, the first moment is the moment of conception. That is when the genetics are very vulnerable to methylation and, therefore, the effects of a harsh environment: the mother under stress, the mother taking drugs, alcohol, and things like that. The second greatest susceptibility is the moment of birth and, of course, there are the third and fourth trimesters. After that, there is a slow sort of susceptibility curve that goes down.

The first two years of life are critical if you overlap them with the emergence of what are called complex adaptive behaviors. When children are born they have some natural kinds of genetic programming. For example, a kid will show certain kinds of fear—of certain people, then of strangers, then it’s acceptance of people—that’s complex-adaptive behavior at work in social interactions. But even laughing, and smiling, and making raspberry sounds are all complex-adaptive behaviors, and they will emerge automatically. You don't need to be taught these things.

One idea is that over the first three years there are 350 very early complex adaptive behaviors that go in sequence, but if somehow you’re interrupted with a stressor, it will affect that particular behavior that’s emerging or just about to emerge. It could be at a year and half, 3 months, or 12 months. After that, the effects of environment really start to drop; by the time you start hitting puberty, you kind of get locked in. And during puberty your frontal lobe system does a switch.

Courtesy James Fallon

Before puberty, a lot of your brain–your frontal lobe and its connections—has to do with the orbital cortex, amygdala, and that lower half of the brain that controls emotional regulation. It is also the origin of people's natural sense of morality, when they learn regulation and the rules of the game, which are ethics. Before then, generally, a normal kid is very much living in a world of id—eating, drinking, some sexualitybut they’re also extremely moralistic. So, those are two things that are fighting each other those first years.

Courtesy James Fallon

Then, there’s a switch that occurs late in adolescence. For some people it could be 17, 18, 19, or 20-years-old. What happens is that the upper part of the brain, the frontal lobe and its connections, start to mature. That's a critical time because that’s usually when you see schizophrenia, some forms of depression, and those major psychiatric disorders emerge. For personality disorders it’s not really known when they will emerge because it’s very understudied. People will say, you can’t do anything about it, it’s locked in and there seems to be almost no treatment. Whereas, for things like depression, bipolar, schizophrenia, anxiety disorders, you can do something about it. There are drugs, or things you can do with brain stimulation and talk therapy, so that's where Big Pharma and the whole industry goes.

You start to really see personality disorders emerge around puberty, but for some children who might be primary psychopaths—that is, they have all the genes and their brain sort of set in the third trimester—this can start emerging very early, around 2 or 3-years-old. That is why we have to have more trained eyes—because that is where this becomes important for society.

A primary psychopath won't necessarily be dangerous, but if we can see that in a kid, we can tell parents to look for certain kinds of behavior. And if those behaviors emerge, we can safely discuss, protecting the privacy of that family and of the kid, how to have the child interact with a nurse practitioner or a trained professional. At that point, we can say: Make sure this kid is never bullied in school; keep them away from street violence, on and on.

A lot of kids, most kids, get bullied and they may get pissed off, but that doesn’t create a personality disorder. But there are 20 percent of kids who are really susceptible and they may ultimately be triggered for a personality disorder in puberty. If we know these children can be helped by making sure that they aren't abused or abandoned—because you've got to get there really earlywell, then, that would be important to do. I don't mean to preach.

Well, go into the idea of preaching a little. You make a kind of grandiose statement at the beginning of your book that research into psychopaths, even with all of the privacy concerns, could have great implications for things from parenting to World Peace. What does that mean?

It means, for example, that if you have to go to war, and sometimes you probably have to go to war—I'm not talking about a belligerent country starting war or fomenting discord, but if you have to go to war and to engage infantryyou do not send 18-year-olds into it, because their brains aren't set. They don’t know how to adjudicate what's happening emotionally and hormonally with the intellectualization of it. When you're 20, 25, it’s a different matter because things gel a little more. Our emotions don't get away from us as much in terms of what is happening. Other factors, sociological ones like what soldiers return to, are also important, but we're not going to get rid of war any time soon, so we might as well engage in a way that does the least amount of damage.

In terms of legal action, you've been used as a researcher for court cases—not to determine guilt or innocence, but for sentencing. Do you think there’s a moral boundary for that since we don’t have enough knowledge on this field yet to determine guilt or innocence?

We don't have enough research. You can't just take genetics—even though I'm a big proponent of it—or imaging, and tell if someone's a criminal or a psychopath. If you put together all that information, you could explain a lot of behavior and causality and early abuse—but we don't know enough.

So, when I get a case to look at, first of all, I don't accept moneyand it's not because I'm a nice guy. It's because I think I'd be biased. I don't accept any payment and I don't want to know who the person is. We all try to create a story or narrative, and I'm just as weak as anybody. I'll tell the defense attorney, or public defender, or whoever it is to just send me scans, maybe with normal scans to try to throw me off, and then I'll look at them and discuss what the traits of the person might be based on the lack of activity in certain areas or not.

I can usually say, "Oh, this person might have a language problem," or "This person might have trouble with impulsivity." After all of that analysis is there, we can look at their traits and see what they've done.

We've talked a lot about how to support a child that might be psychopathic, but what if the parent is the one whose brain resembles that of a psychopath? For example, what was it like for you to form attachments with your own children?

During the time when our kids were the most vulnerable, they remember a magical time with me. In talking about this, our three oldest children have said they thought I was the warm one who was always around and always interacting with them, and they don't understand how I could say that I was cold to them. But my wife and I were 21 when we got married. Things started changing for me when I was about 19 or 20-years-old, and it was really in my late 20s when the kids were older and took care of themselves more, that I took on a lot of these psychopathic qualities—though early on I clearly had some. My actual behavior didn't go south until later on, and I think my wife's stability kept things together.

Some people have this psychopathy or are almost psychopaths, and they get into trouble and go right to jail and end up in the prison system as 18-year-olds. It's awful because they get unlucky and they don't have enough impulse control to pull it back at the last instant. So, what is that edge where somebody's got these traits, and they are impulsive? What puts one guy on a pathway to becoming an attorney or successful in general, and the other one has life in prison? We just have to find out what that edge is. I think we will have parameters to work with, but it's not the same for everybody.

Zendar is hiring a Research Engineer

$
0
0
Zendar is hiring a Research Engineer
1 hour ago | hide
About Zendar Zendar is a Berkeley-based startup building the next generation high-resolution radar solution for autonomous vehicles. Current perception systems that solely rely on LiDAR and camera are unable to operate in bad weather conditions. Zendar is developing critical technology for autonomous vehicles to operate reliably in all weather conditions, such as heavy rain, fog, and snow.

About the Role We are looking for a full time Research Engineer to join our radar imaging algorithms team. The candidate will contribute to the development of novel radar imaging algorithms.

Qualifications MS or PhD in Computer Engineering, Electrical Engineering, Applied Mathematics, Astronomy, or related field Solid understanding of signal processing and optimization techniques Experience with C++ and Python is required Knowledge/familiarity of radar imaging, sensor fusion (GPS/INS with other sensors) is preferred

What Else We Have to Offer An opportunity to work in a team with deep experience in autonomous perception Convenient location in West Berkeley Free and nearby parking Daily catered lunches Unlimited vacation Competitive salary, benefits and equity

If you are interested, please send your resume to jobs@zendar.io


Applications are open for YC Summer 2018

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Why Siri is behind the Google Assistant and Alexa

$
0
0
Seven years after Siri launched on the iPhone 4S and it's still not as smart as it should be.
Seven years after Siri launched on the iPhone 4S and it's still not as smart as it should be.

Image: jhila farzaneh/mashable

It's no secret that Siri is way behind other voice assistants like the Google Assistant and Amazon's Alexa when it comes to comprehension and total number of skills. 

Apple has drastically improved Siri over the years, adding new features and upgrading its voice to sound more human-like, but its ongoing shortcomings really revealed themselves in the recent launch of the HomePod, the company's first product that's almost entirely controlled by the voice assistant.

So how did Apple screw up Siri so badly when it was released so far in advance of the competition? A new report from The Information reveals how years of missteps left Siri eating dust.

According to the report, after acquiring the original Siri app in 2010 for $200 million, Apple proceeded to quickly integrate the digital assistant into the iPhone 4S in 2011. There was so much potential for Siri, and Apple promised to bring voice controls to the masses just as it did multi-touch on the original iPhone.

Except the voice-controlled computing revolution never quite happened the way Apple predicted. iPhones users quickly realized that Siri couldn't do a lot of things. And even after Apple opened Siri up with SiriKit in 2016, it still isn't as intelligent as the Google Assistant or Alexa.

So what the heck happened?

According The Information, it all went downhill after Steve Jobs died in 2011. Jobs' death marked the beginning of Siri's downfall.

Instead of continuously updating Siri so that it would get smarter faster, Richard Williamson, one of the former iOS chief Scott Forstall's deputies, reportedly only wanted to update the assistant annually to coincide with new iOS releases.

Frustrated by all the patching they were doing to Siri, engineers reportedly batted around the idea of starting over.

This is, of course, not how a digital assistant should be treated. As Google and Amazon have demonstrated, digital assistants need to constantly be updated in the background in order to keep up with the ever-changing demands of its users.

Williamson denies the accusations that he slowed Siri development down and instead cast blame on Siri's creators. 

"It was slow, when it worked at all," Williamson said. "The software was riddled with serious bugs. Those problems lie entirely with the original Siri team, certainly not me."

Other problems over the years included layering new elements on top of Siri using technologies culled from new acquisitions. For example, the Siri team had issues integrating new search features from Apple's acquisition of Topsy in 2013 and natural language features from the VocalIQ acquisition in 2015.

"Members of the Topsy team expressed a reluctance to work with a Siri team they viewed as slow and bogged down by the initial infrastructure that had been patched up but never completely replaced since it launched."

Frustrated by all the patching they were doing to Siri, engineers reportedly considered starting over from scratch. Instead of building on top of Siri's reportedly bad infrastructure, they would rebuild Siri from the ground up — correctly on the second time around. Of course, when you're serving hundreds of millions of users across all of Apple's devices, that's a tall task.

The most revealing part of the report exposes how Apple didn't even have plans to integrate Siri into HomePod until after the Amazon Echo launched:

In a sign of how unprepared Apple was to deal with a rivalry, two Siri team members told The Information that their team didn’t even learn about Apple’s HomePod project until 2015—after Amazon unveiled the Echo in late 2014. One of Apple’s original plans was to launch its speaker without Siri included, according to a source.

Right now, it looks like Siri won't be blown up and a rebuilt. And if Apple wants to transform its assistant into a true competitor to the Google Assistant and Alexa, it'll need to sort out its internal management issues and decide what it really wants Siri to be. For all users, we hope it's more intelligence and deeper integration with third-party apps and services.


Cloud Act – Improve law enforcement access to data stored across borders

$
0
0

S. 2383

To amend title 18, United States Code, to improve law enforcement access to data stored across borders, and for other purposes.

To amend title 18, United States Code, to improve law enforcement access to data stored across borders, and for other purposes.

Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,

SECTION 1.Short title.

This Act may be cited as the “Clarifying Lawful Overseas Use of Data Act” or the “CLOUD Act”.

SEC. 2. Congressional findings.

Congress finds the following:

(1) Timely access to electronic data held by communications-service providers is an essential component of government efforts to protect public safety and combat serious crime, including terrorism.

(2) Such efforts by the United States Government are being impeded by the inability to access data stored outside the United States that is in the custody, control, or possession of communications-service providers that are subject to jurisdiction of the United States.

(3) Foreign governments also increasingly seek access to electronic data held by communications-service providers in the United States for the purpose of combating serious crime.

(4) Communications-service providers face potential conflicting legal obligations when a foreign government orders production of electronic data that United States law may prohibit providers from disclosing.

(5) Foreign law may create similarly conflicting legal obligations when chapter 121 of title 18, United States Code (commonly known as the “Stored Communications Act”), requires disclosure of electronic data that foreign law prohibits communications-service providers from disclosing.

(6) International agreements provide a mechanism for resolving these potential conflicting legal obligations where the United States and the relevant foreign government share a common commitment to the rule of law and the protection of privacy and civil liberties.

SEC. 3. Preservation of records; comity analysis of legal process.

(a) Required preservation and disclosure of communications and records.—

(1) AMENDMENT.—Chapter 121 of title 18, United States Code, is amended by adding at the end the following:

§ 2713. Required preservation and disclosure of communications and records

“A provider of electronic communication service or remote computing service shall comply with the obligations of this chapter to preserve, backup, or disclose the contents of a wire or electronic communication and any record or other information pertaining to a customer or subscriber within such provider’s possession, custody, or control, regardless of whether such communication, record, or other information is located within or outside of the United States.”.

(2) TABLE OF SECTIONS.—The table of sections for chapter 121 of title 18, United States Code, is amended by inserting after the item relating to section 2712 the following:
“2713. Required preservation and disclosure of communications and records.”.

(b) Comity analysis of legal process seeking contents of wire or electronic communication.—Section 2703 of title 18, United States Code, is amended by adding at the end the following:

“(h) Comity analysis and disclosure of information regarding legal process seeking contents of wire or electronic communication.—

“(1) DEFINITIONS.—In this subsection—

“(A) the term ‘qualifying foreign government’ means a foreign government—

“(i) with which the United States has an executive agreement that has entered into force under section 2523; and

“(ii) the laws of which provide to electronic communication service providers and remote computing service providers substantive and procedural opportunities similar to those provided under paragraphs (2) and (5); and

“(B) the term ‘United States person’ has the meaning given the term in section 2523.

“(2) MOTIONS TO QUASH OR MODIFY.—(A) A provider of electronic communication service to the public or remote computing service, that is being required to disclose pursuant to legal process issued under this section the contents of a wire or electronic communication of a subscriber or customer, may file a motion to modify or quash the legal process where the provider reasonably believes—

“(i) that the customer or subscriber is not a United States person and does not reside in the United States; and

“(ii) that the required disclosure would create a material risk that the provider would violate the laws of a qualifying foreign government.

Such a motion shall be filed not later than 14 days after the date on which the provider was served with the legal process, absent agreement with the government or permission from the court to extend the deadline based on an application made within the 14 days. The right to move to quash is without prejudice to any other grounds to move to quash or defenses thereto, but it shall be the sole basis for moving to quash on the grounds of a conflict of law related to a qualifying foreign government.

“(B) Upon receipt of a motion filed pursuant to subparagraph (A), the court shall afford the governmental entity that applied for or issued the legal process under this section the opportunity to respond. The court may modify or quash the legal process, as appropriate, only if the court finds that—

“(i) the required disclosure would cause the provider to violate the laws of a qualifying foreign government;

“(ii) based on the totality of the circumstances, the interests of justice dictate that the legal process should be modified or quashed; and

“(iii) the customer or subscriber is not a United States person and does not reside in the United States.

“(3) COMITY ANALYSIS.—For purposes of making a determination under paragraph (2)(B)(ii), the court shall take into account, as appropriate—

“(A) the interests of the United States, including the investigative interests of the governmental entity seeking to require the disclosure;

“(B) the interests of the qualifying foreign government in preventing any prohibited disclosure;

“(C) the likelihood, extent, and nature of penalties to the provider or any employees of the provider as a result of inconsistent legal requirements imposed on the provider;

“(D) the location and nationality of the subscriber or customer whose communications are being sought, if known, and the nature and extent of the subscriber or customer’s connection to the United States, or if the legal process has been sought on behalf of a foreign authority pursuant to section 3512, the nature and extent of the subscriber or customer’s connection to the foreign authority’s country;

“(E) the nature and extent of the provider’s ties to and presence in the United States;

“(F) the importance to the investigation of the information required to be disclosed;

“(G) the likelihood of timely and effective access to the information required to be disclosed through means that would cause less serious negative consequences; and

“(H) if the legal process has been sought on behalf of a foreign authority pursuant to section 3512, the investigative interests of the foreign authority making the request for assistance.

“(4) DISCLOSURE OBLIGATIONS DURING PENDENCY OF CHALLENGE.—A service provider shall preserve, but not be obligated to produce, information sought during the pendency of a motion brought under this subsection, unless the court finds that immediate production is necessary to prevent an adverse result identified in section 2705(a)(2).

“(5) DISCLOSURE TO QUALIFYING FOREIGN GOVERNMENT.—(A) It shall not constitute a violation of a protective order issued under section 2705 for a provider of electronic communication service to the public or remote computing service to disclose to the entity within a qualifying foreign government, designated in an executive agreement under section 2523, the fact of the existence of legal process issued under this section seeking the contents of a wire or electronic communication of a customer or subscriber who is a national or resident of the qualifying foreign government.

“(B) Nothing in this paragraph shall be construed to modify or otherwise affect any other authority to make a motion to modify or quash a protective order issued under section 2705.”.

(c) Rule of construction.—Nothing in this section, or an amendment made by this section, shall be construed to modify or otherwise affect the common law standards governing the availability or application of comity analysis to other types of compulsory process or to instances of compulsory process issued under section 2703 of title 18, United States Code, as amended by this section, and not covered under subsection (h)(2) of such section 2703.

SEC. 4. Additional amendments to current communications laws.

Title 18, United States Code, is amended—

(1) in chapter 119—

(A) in section 2511(2), by adding at the end the following:

“(j) It shall not be unlawful under this chapter for a provider of electronic communication service to the public or remote computing service to intercept or disclose the contents of a wire or electronic communication in response to an order from a foreign government that is subject to an executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523.”; and

(B) in section 2520(d), by amending paragraph (3) to read as follows:

“(3) a good faith determination that section 2511(3), 2511(2)(i), or 2511(2)(j) of this title permitted the conduct complained of;”;

(2) in chapter 121—

(A) in section 2702—

(i) in subsection (b)—

(I) in paragraph (8), by striking the period at the end and inserting “; or”; and

(II) by adding at the end the following:

“(9) to a foreign government pursuant to an order from a foreign government that is subject to an executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523.”; and

(ii) in subsection (c)—

(I) in paragraph (5), by striking “or” at the end;

(II) in paragraph (6), by striking the period at the end and inserting “; or”; and

(III) by adding at the end the following:

“(7) to a foreign government pursuant to an order from a foreign government that is subject to an executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523.”; and

(B) in section 2707(e), by amending paragraph (3) to read as follows:

“(3) a good faith determination that section 2511(3), section 2702(b)(9), or section 2702(c)(7) of this title permitted the conduct complained of;”; and

(3) in chapter 206—

(A) in section 3121(a), by inserting before the period at the end the following: “or an order from a foreign government that is subject to an executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523”; and

(B) in section 3124—

(i) by amending subsection (d) to read as follows:

“(d) No cause of action against a provider disclosing information under this chapter.—No cause of action shall lie in any court against any provider of a wire or electronic communication service, its officers, employees, agents, or other specified persons for providing information, facilities, or assistance in accordance with a court order under this chapter, request pursuant to section 3125 of this title, or an order from a foreign government that is subject to an executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523.”; and

(ii) by amending subsection (e) to read as follows:

“(e) Defense.—A good faith reliance on a court order under this chapter, a request pursuant to section 3125 of this title, a legislative authorization, a statutory authorization, or a good faith determination that the conduct complained of was permitted by an order from a foreign government that is subject to executive agreement that the Attorney General has determined and certified to Congress satisfies section 2523, is a complete defense against any civil or criminal action brought under this chapter or any other law.”.

SEC. 5. Executive agreements on access to data by foreign governments.

(a) In general.—Chapter 119 of title 18, United States Code, is amended by adding at the end the following:

§ 2523. Executive agreements on access to data by foreign governments

“(a) Definitions.—In this section—

“(1) the term ‘lawfully admitted for permanent residence’ has the meaning given the term in section 101(a) of the Immigration and Nationality Act (8 U.S.C. 1101(a)); and

“(2) the term ‘United States person’ means a citizen or national of the United States, an alien lawfully admitted for permanent residence, an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence, or a corporation that is incorporated in the United States.

“(b) Executive agreement requirements.—For purposes of this chapter, chapter 121, and chapter 206, an executive agreement governing access by a foreign government to data subject to this chapter, chapter 121, or chapter 206 shall be considered to satisfy the requirements of this section if the Attorney General, with the concurrence of the Secretary of State, determines, and submits a written certification of such determination to Congress, that—

“(1) the domestic law of the foreign government, including the implementation of that law, affords robust substantive and procedural protections for privacy and civil liberties in light of the data collection and activities of the foreign government that will be subject to the agreement, if—

“(A) such a determination under this section takes into account, as appropriate, credible information and expert input; and

“(B) the factors to be considered in making such a determination include whether the foreign government—

“(i) has adequate substantive and procedural laws on cybercrime and electronic evidence, as demonstrated by being a party to the Convention on Cybercrime, done at Budapest November 23, 2001, and entered into force January 7, 2004, or through domestic laws that are consistent with definitions and the requirements set forth in chapters I and II of that Convention;

“(ii) demonstrates respect for the rule of law and principles of nondiscrimination;

“(iii) adheres to applicable international human rights obligations and commitments or demonstrates respect for international universal human rights, including—

“(I) protection from arbitrary and unlawful interference with privacy;

“(II) fair trial rights;

“(III) freedom of expression, association, and peaceful assembly;

“(IV) prohibitions on arbitrary arrest and detention; and

“(V) prohibitions against torture and cruel, inhuman, or degrading treatment or punishment;

“(iv) has clear legal mandates and procedures governing those entities of the foreign government that are authorized to seek data under the executive agreement, including procedures through which those authorities collect, retain, use, and share data, and effective oversight of these activities;

“(v) has sufficient mechanisms to provide accountability and appropriate transparency regarding the collection and use of electronic data by the foreign government; and

“(vi) demonstrates a commitment to promote and protect the global free flow of information and the open, distributed, and interconnected nature of the Internet;

“(2) the foreign government has adopted appropriate procedures to minimize the acquisition, retention, and dissemination of information concerning United States persons subject to the agreement; and

“(3) the agreement requires that, with respect to any order that is subject to the agreement—

“(A) the foreign government may not intentionally target a United States person or a person located in the United States, and shall adopt targeting procedures designed to meet this requirement;

“(B) the foreign government may not target a non-United States person located outside the United States if the purpose is to obtain information concerning a United States person or a person located in the United States;

“(C) the foreign government may not issue an order at the request of or to obtain information to provide to the United States Government or a third-party government, nor shall the foreign government be required to share any information produced with the United States Government or a third-party government;

“(D) an order issued by the foreign government—

“(i) shall be for the purpose of obtaining information relating to the prevention, detection, investigation, or prosecution of serious crime, including terrorism;

“(ii) shall identify a specific person, account, address, or personal device, or any other specific identifier as the object of the order;

“(iii) shall be in compliance with the domestic law of that country, and any obligation for a provider of an electronic communications service or a remote computing service to produce data shall derive solely from that law;

“(iv) shall be based on requirements for a reasonable justification based on articulable and credible facts, particularity, legality, and severity regarding the conduct under investigation;

“(v) shall be subject to review or oversight by a court, judge, magistrate, or other independent authority; and

“(vi) in the case of an order for the interception of wire or electronic communications, and any extensions thereof, shall require that the interception order—

“(I) be for a fixed, limited duration;

“(II) may not last longer than is reasonably necessary to accomplish the approved purposes of the order; and

“(III) be issued only if the same information could not reasonably be obtained by another less intrusive method;

“(E) an order issued by the foreign government may not be used to infringe freedom of speech;

“(F) the foreign government shall promptly review material collected pursuant to the agreement and store any unreviewed communications on a secure system accessible only to those persons trained in applicable procedures;

“(G) the foreign government shall, using procedures that, to the maximum extent possible, meet the definition of minimization procedures in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801), segregate, seal, or delete, and not disseminate material found not to be information that is, or is necessary to understand or assess the importance of information that is, relevant to the prevention, detection, investigation, or prosecution of serious crime, including terrorism, or necessary to protect against a threat of death or serious bodily harm to any person;

“(H) the foreign government may not disseminate the content of a communication of a United States person to United States authorities unless the communication may be disseminated pursuant to subparagraph (G) and relates to significant harm, or the threat thereof, to the United States or United States persons, including crimes involving national security such as terrorism, significant violent crime, child exploitation, transnational organized crime, or significant financial fraud;

“(I) the foreign government shall afford reciprocal rights of data access, to include, where applicable, removing restrictions on communications service providers, including providers subject to United States jurisdiction, and thereby allow them to respond to valid legal process sought by a governmental entity (as defined in section 2711) if foreign law would otherwise prohibit communications-service providers from disclosing the data;

“(J) the foreign government shall agree to periodic review of compliance by the foreign government with the terms of the agreement to be conducted by the United States Government; and

“(K) the United States Government shall reserve the right to render the agreement inapplicable as to any order for which the United States Government concludes the agreement may not properly be invoked.

“(c) Limitation on judicial review.—A determination or certification made by the Attorney General under subsection (b) shall not be subject to judicial or administrative review.

“(d) Effective date of certification.—

“(1) NOTICE.—Not later than 7 days after the date on which the Attorney General certifies an executive agreement under subsection (b), the Attorney General shall provide notice of the determination under subsection (b) and a copy of the executive agreement to Congress, including—

“(A) the Committee on the Judiciary and the Committee on Foreign Relations of the Senate; and

“(B) the Committee on the Judiciary and the Committee on Foreign Affairs of the House of Representatives.

“(2) ENTRY INTO FORCE.—An executive agreement that is determined and certified by the Attorney General to satisfy the requirements of this section shall enter into force not earlier than the date that is 90 days after the date on which notice is provided under paragraph (1), unless Congress enacts a joint resolution of disapproval in accordance with paragraph (4).

“(3) CONSIDERATION BY COMMITTEES.—

“(A) IN GENERAL.—During the 60-day period beginning on the date on which notice is provided under paragraph (1), each congressional committee described in paragraph (1) may—

“(i) hold one or more hearings on the executive agreement; and

“(ii) submit to their respective House of Congress a report recommending whether the executive agreement should be approved or disapproved.

“(B) REQUESTS FOR INFORMATION.—Upon request by the Chairman or Ranking Member of a congressional committee described in paragraph (1), the head of an agency shall promptly furnish a summary of factors considered in determining that the foreign government satisfies the requirements of this section.

“(4) CONGRESSIONAL REVIEW.—

“(A) JOINT RESOLUTION DEFINED.—In this paragraph, the term ‘joint resolution’ means only a joint resolution—

“(i) introduced during the 90-day period described in paragraph (2);

“(ii) which does not have a preamble;

“(iii) the title of which is as follows: ‘Joint resolution disapproving the executive agreement signed by the United States and __.’, the blank space being appropriately filled in; and

“(iv) the matter after the resolving clause of which is as follows: ‘That Congress disapproves the executive agreement governing access by ___ to certain electronic data as submitted by the Attorney General on ___’, the blank spaces being appropriately filled in.

“(B) JOINT RESOLUTION ENACTED.—Notwithstanding any other provision of this section, if not later than 90 days after the date on which notice is provided to Congress under paragraph (1), there is enacted into law a joint resolution disapproving of an executive agreement under this section, the executive agreement shall not enter into force.

“(C) INTRODUCTION.—During the 90-day period described in subparagraph (B), a joint resolution of disapproval may be introduced—

“(i) in the House of Representatives, by the majority leader or the minority leader; and

“(ii) in the Senate, by the majority leader (or the majority leader’s designee) or the minority leader (or the minority leader’s designee).

“(5) FLOOR CONSIDERATION IN HOUSE OF REPRESENTATIVES.—If a committee of the House of Representatives to which a joint resolution of disapproval has been referred has not reported the joint resolution within 60 days after the date of referral, that committee shall be discharged from further consideration of the joint resolution.

“(6) CONSIDERATION IN THE SENATE.—

“(A) COMMITTEE REFERRAL.—A joint resolution of disapproval introduced in the Senate shall be—

“(i) referred to the Committee on the Judiciary; and

“(ii) referred to the Committee on Foreign Relations.

“(B) REPORTING AND DISCHARGE.—If a committee to which a joint resolution of disapproval was referred has not reported the joint resolution within 60 days after the date of referral of the joint resolution, that committee shall be discharged from further consideration of the joint resolution and the joint resolution shall be placed on the appropriate calendar.

“(C) PROCEEDING TO CONSIDERATION.—Notwithstanding rule XXII of the Standing Rules of the Senate, it is in order at any time after either the Committee on the Judiciary or the Committee on Foreign Relations, as the case may be, reports a joint resolution of disapproval to the Senate or has been discharged from consideration of such a joint resolution (even though a previous motion to the same effect has been disagreed to) to move to proceed to the consideration of the joint resolution, and all points of order against the joint resolution (and against consideration of the joint resolution) are waived. The motion is not subject to a motion to postpone. A motion to reconsider the vote by which the motion is agreed to or disagreed to shall not be in order.

“(D) RULINGS OF THE CHAIR ON PROCEDURE.—Appeals from the decisions of the Chair relating to the application of the rules of the Senate, as the case may be, to the procedure relating to a joint resolution of disapproval shall be decided without debate.

“(E) CONSIDERATION OF VETO MESSAGES.—Debate in the Senate of any veto message with respect to a joint resolution of disapproval, including all debatable motions and appeals in connection with the joint resolution, shall be limited to 10 hours, to be equally divided between, and controlled by, the majority leader and the minority leader or their designees.

“(7) RULES RELATING TO SENATE AND HOUSE OF REPRESENTATIVES.—

“(A) TREATMENT OF SENATE JOINT RESOLUTION IN HOUSE.—In the House of Representatives, the following procedures shall apply to a joint resolution of disapproval received from the Senate (unless the House has already passed a joint resolution relating to the same proposed action):

“(i) The joint resolution shall be referred to the appropriate committees.

“(ii) If a committee to which a joint resolution has been referred has not reported the joint resolution within 7 days after the date of referral, that committee shall be discharged from further consideration of the joint resolution.

“(iii) Beginning on the third legislative day after each committee to which a joint resolution has been referred reports the joint resolution to the House or has been discharged from further consideration thereof, it shall be in order to move to proceed to consider the joint resolution in the House. All points of order against the motion are waived. Such a motion shall not be in order after the House has disposed of a motion to proceed on the joint resolution. The previous question shall be considered as ordered on the motion to its adoption without intervening motion. The motion shall not be debatable. A motion to reconsider the vote by which the motion is disposed of shall not be in order.

“(iv) The joint resolution shall be considered as read. All points of order against the joint resolution and against its consideration are waived. The previous question shall be considered as ordered on the joint resolution to final passage without intervening motion except 2 hours of debate equally divided and controlled by the sponsor of the joint resolution (or a designee) and an opponent. A motion to reconsider the vote on passage of the joint resolution shall not be in order.

“(B) TREATMENT OF HOUSE JOINT RESOLUTION IN SENATE.—

“(i) If, before the passage by the Senate of a joint resolution of disapproval, the Senate receives an identical joint resolution from the House of Representatives, the following procedures shall apply:

“(I) That joint resolution shall not be referred to a committee.

“(II) With respect to that joint resolution—

“(aa) the procedure in the Senate shall be the same as if no joint resolution had been received from the House of Representatives; but

“(bb) the vote on passage shall be on the joint resolution from the House of Representatives.

“(ii) If, following passage of a joint resolution of disapproval in the Senate, the Senate receives an identical joint resolution from the House of Representatives, that joint resolution shall be placed on the appropriate Senate calendar.

“(iii) If a joint resolution of disapproval is received from the House, and no companion joint resolution has been introduced in the Senate, the Senate procedures under this subsection shall apply to the House joint resolution.

“(C) APPLICATION TO REVENUE MEASURES.—The provisions of this paragraph shall not apply in the House of Representatives to a joint resolution of disapproval that is a revenue measure.

“(8) RULES OF HOUSE OF REPRESENTATIVES AND SENATE.—This subsection is enacted by Congress—

“(A) as an exercise of the rulemaking power of the Senate and the House of Representatives, respectively, and as such is deemed a part of the rules of each House, respectively, and supersedes other rules only to the extent that it is inconsistent with such rules; and

“(B) with full recognition of the constitutional right of either House to change the rules (so far as relating to the procedure of that House) at any time, in the same manner, and to the same extent as in the case of any other rule of that House.

“(e) Renewal of determination.—

“(1) IN GENERAL.—The Attorney General, with the concurrence of the Secretary of State, shall renew a determination under subsection (b) every 5 years.

“(2) REPORT.—Upon renewing a determination under subsection (b), the Attorney General shall file a report with the Committee on the Judiciary and the Committee on Foreign Relations of the Senate and the Committee on the Judiciary and the Committee on Foreign Affairs of the House of Representatives describing—

“(A) the reasons for the renewal;

“(B) any substantive changes to the agreement or to the relevant laws or procedures of the foreign government since the original determination or, in the case of a second or subsequent renewal, since the last renewal; and

“(C) how the agreement has been implemented and what problems or controversies, if any, have arisen as a result of the agreement or its implementation.

“(3) NONRENEWAL.—If a determination is not renewed under paragraph (1), the agreement shall no longer be considered to satisfy the requirements of this section.

“(f) Publication.—Any determination or certification under subsection (b) regarding an executive agreement under this section, including any termination or renewal of such an agreement, shall be published in the Federal Register as soon as is reasonably practicable.

“(g) Minimization procedures.—A United States authority that receives the content of a communication described in subsection (b)(3)(H) from a foreign government in accordance with an executive agreement under this section shall use procedures that, to the maximum extent possible, meet the definition of minimization procedures in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801) to appropriately protect nonpublicly available information concerning United States persons.”.

(b) Table of sections amendment.—The table of sections for chapter 119 of title 18, United States Code, is amended by inserting after the item relating to section 2522 the following:


“2523. Executive agreements on access to data by foreign governments.”.

SEC. 6. Rule of construction.

Nothing in this Act, or the amendments made by this Act, shall be construed to preclude any foreign authority from obtaining assistance in a criminal investigation or prosecution pursuant to section 3512 of title 18, United States Code, section 1782 of title 28, United States Code, or as otherwise provided by law.

Why do entrepreneurs engage in self-sabotage?

$
0
0

(written by lawrence krubner, however indented passages are often quotes). You can contact lawrence at: lawrence@krubner.com

Just to get this out of the way, entrepreneurs engage in all of the self-destructive habits that non-entrepreneurs sometimes engage in: drug addiction, denial, blame shifting, perfectionism, depression, mania, laziness, etc. I’m not going to write about that, because all of that is too obvious, and great essays have already been written about those subjects. Instead I’m going to write about the self-destructive habits that are unique to entrepreneurs. There are 3 patterns that I have seen a lot of:

1.) A product or service begins to gain a following with a small niche. The entrepreneur is heartbroken. They can not see any way to move beyond that niche. They had dreamed that their startup would grow till it was larger than Google, therefore success with a small niche is disappointing.

2.) A startup achieves a success of a conventional type and, therefore, the entrepreneur regards it as boring. Perhaps the site was suppose to pioneer an altogether new style of interaction among humans, and instead the part of the startup that becomes popular is of an old type – for instance, the company blog becomes highly popular. The entrepreneur is then disappointed, maybe even angry, to be the owner of a boring success.

3.) The entrepreneur will have to engage in new areas of activity which make them uncomfortable. For instance, a software engineer comes up with cool software that has real utility for an industry. To achieve success, the engineer must either become a salesperson, or raise money from investors so that they can hire a salesperson. But the engineer is not comfortable with sales, nor are they comfortable talking to investors. What they are comfortable doing is working on their software, so they continue doing that. Afternoons are spent at co-working spaces where clever new features are added. The software gets better and better, but without the structure of a company dedicated to promoting it, it languishes in obscurity.

The above is the summary. Below I’ll expand on these 3 destructive forms of self-sabotage

A product or service gains a following with a small niche

Peter Drucker, perhaps the greatest business guru of the 20th Century, once remarked that innovators are often disappointed by the manner in which their innovations become popular. In his 1985 book, Innovation and Entrepreneurship, Drucker relates the story of Alfred Einhorn, who invented Novocain, which then became popular with dentists as a local anesthetic. Einhorn held a contempt for dentistry, since it was such a small market. He felt that Novocain should be used by surgeons for all forms of surgery. General surgery was more prestigious than dentistry, and so Einhorn waged a campaign against the use of Novocain by dentists. In the end, his innovation was successful despite him, rather than because of him. According to Drucker, this pattern, where a product is undercut by the entrepreneur who created it, is extremely common.

When I first read Drucker’s book I found it hard to believe that an entrepreneur would actively sabotage their own innovation. However, having now spent almost 20 years working with startups, I’ve seen that it is, indeed, a common pattern.

There is a lot of power to be had from starting with a small niche. When Facebook started in 2004, it had no hope of competing directly with MySpace. Being exclusive to universities gave Facebook a niche where it could build up momentum, before opening up to the general public.

I talk to a lot of entrepreneurs who worry that if they focus on a small niche, the market opportunity will be too small to interest investors. My response is “It is better to own 1% of something than to own 100% of nothing.” If starting with a niche means success, whereas going after the general market means failure, then starting with a niche is the right answer. And with tech startups, this applies nearly always.

A startup achieves a success of a conventional type

From 2002 to 2008, I worked with an entrepreneur who was a bit of a dreamer. He considered himself a visionary, someone who understood the future. He read history, pop culture, art, science and tech — he complimented himself on his ability to synthesize different types of information. I credit him with being very creative, but also torn apart by some internal contradictions. He insisted that he was unconventional, and he wanted the world to acknowledge that his creativity grew out of his non-conformism. In particular, he had a need to impress his father, and to get his father to acknowledge that unconventional paths could also be highly successful. We burned through several million dollars on several ideas, any of one of which could have been a success — but each of which felt too ordinary for him, causing him to lose interest. After several years of working together, we had a modest success, when we built the iHanuman yoga site. The site was immediately profitable, and it remains so even now, 9 years later. If you are looking to buy instructional videos about yogo, the site is a wonderful resource. I suggested that we use the same technology to build a whole series of websites focused on different topics, such as cooking and tennis and golf. But my business partner refused to even consider such a strategy. He was angry about iHanuman, which had been his girlfriend’s idea (she was a yoga instructor). We had burned through several million dollars looking for a “visionary” idea, and then in the end we had success with a fairly simple idea, selling instructional videos. If he had been willing to proceed with a boring success, we could have built an empire around that idea. Indeed, just a few years later, the crew behind Revolution Golf was to succeed as we should have, selling instructional videos about golf, and slowly building a whole set of related businesses around that (I think they now have bought 4 other sites relating to golf and sports?).

Many tech entrepreneurs starts companies at least in part because they consider themselves uniquely creative and insightful, and they want the whole world to see them as they see themselves. Often, the project they launch reveals an unexpected truth: their insights are proven false, what works in the end is something surprising.

What is the right way to handle unexpected success? In 1992, when Bo Peabody launched Tripod, he was thinking that the site would offer content aimed at college students. His idea failed. The company was saved because some of the programmers at the company had started a side project that allowed anyone to create their own web pages. This then became the future of the company. In his book, Lucky or Smart, Peabody says it is important to be smart enough to know when you are getting lucky. And then, you have to be willing to accept that luck. This takes humility. What’s needed in an entrepreneur is emotional resilience, the kind of strength that allows a person to show grace when their ideas have been proven wrong. One has to adapt to each surprise.

The entrepreneur will have to engage in new areas of activity which make them uncomfortable

Some of the things you need to do as an entrepreneur: sales, marketing, strategy, hiring, firing, accounting, law, taxes. Were these your specialities? Probably not. Starting a business forces people to engage in a lot of activities that they previously knew nothing about, and which they do not enjoy. But they are necessary activities.

I’ve spent most of 20 years writing software, so perhaps this is the pattern I’ve seen the most: the software developer who starts a company but who wants to continue to write software, because that is where they are the most comfortable. Yet they need to push themselves to do a lot else. Or else they fail.

Very few entrepreneurs start off as professional entrepreneurs. Most of them are something else first: a medical researcher, a Wall Street trader, a software engineer, a school teacher, a plumber, a restaurant server, an accountant. They are working in some specific role when they get their idea for starting a business. But they will need to learn new skills.

Some examples.

Rehearsals are important. I wish I could convince more entrepreneurs of this. Ted Talks, TV interviews, podcasts, MeetUps. I’ve seen entrepreneurs who are invited to speak in public, and they do badly. What should be a triumph becomes an embarrassment. Failure to rehearse is perhaps the most obvious form of self-sabotage.

When you become an entrepreneur, you will have to talk about your fledgling startup all the time. To investors, to customers, to your family, to your workers, to the public. You will be talking about it all the time. You need to do this well.

Speaking well in public is a skill that can be learned. Consider the professionals who spend their lives doing so. It doesn’t matter if your idea of charm is George Clooney or Will Smith or Paul Giamatti. Maybe you are fan of Ellen Page or Taraji Henson. Maybe you swoon over Gal Gadot. They all have an easy grace when speaking in public, because they have spent so many years doing so. They were not born that way.

On Friday I had lunch with an entrepreneur who struck me as unusually well-spoken. I said this to her and she made a self-deprecating joke about her awkwardness. But we discussed the issue for a few more minutes and she revealed that she sometimes used a video camera to record herself talking, and then she watched the video to see how she is coming across. And this is a fantastic technique.

If recording yourself makes you uncomfortable, then talk to a mirror. The important thing is to rehearse.

Mistakes I’ve seen entrepreneurs make when they don’t rehearse their presentation:

1.) they forget important points that need to be made

2.) they go off on unrelated tangents

3.) they attempt jokes that go badly

4.) they stutter

5.) they attempt to tell a story, but ruin it by telling the events out of order

6.) they indulge in mannerisms of which they are not conscious, but which are highly distracting to their audience

7.) they do not appear confident

I have a number of friends who are actors. They are also work with an organization that teaches business leaders how to speak in public. Among the skills they emphasize:

1.) how to hold space

2.) when to use silence

3.) when to use a conversational tone

4.) the importance of simple storytelling

5.) the distracting nature of body tics or mannerisms

One of my friends told me “The most important thing we do is video record them and then show them the video. It is absolutely brutal in terms of revealing body language.”

This kind of work used to be a specialty of the Eagles Flight Institute and though they have moved away from it, they are still a great source of different kinds of experiential learning for business leaders.

Another failure mode that I have seen is perfectionism regarding one aspect of the process of establishing the business. Twice I have seen entrepreneurs spend countless hours, over several months, polishing the pitch deck they use to woo investors. In both cases, the entrepreneurs fell into this pattern when things were going badly. They were running out of money and they were feeling a lot of stress. This kind of perfectionism is always a form of avoidance. They felt they could not control the technology, nor the tech team, nor the customers, but they could control their pitch deck, so they poured all of their energy into that. Colors, fonts, images: they would tweak it endlessly. The pitch deck did not necessarily get better, it simply changed. Meanwhile, the business got worse because other essential activities were being avoided. This kind of activity verges on depression, which is understandable when a person is under a lot of stress. It is crucial that the entrepreneur find some healthy way to deal with the stress: go running, find a therapist, take anti-depressants, have long talks with a trusted friend or minister — whatever it takes. If an entrepreneur is in a funk, either they snap out of it, or the business is doomed.

Different entrepreneurs will have different strengths and weaknesses. That is natural. The important thing is to recognize that some activities are absolutely essential. Either hire someone to do them, or learn how to do them. A good entrepreneur doesn’t avoid an activity just because it makes them uncomfortable, or because they find it boring.

Humility and Open-Mindedness

A thought about what it takes to succeed:

No one can accurately predict where the stock market will be in 2 years (otherwise they’d already be a trillionaire). For almost the same reason, no entrepreneur can fully know where their startup will be in 2 years: there are simply too many variables. It is important that innovators be humble about the limits of their knowledge. A fantastic insight in one area can carry you a long way, but it will have to adapt to the millions of small facts that will arise, almost daily, and shape the history of your insight as it passes from concept to reality. If you launch a startup, the odds are against you from the start, and you’re only hope of success is to remain open minded about what might work.

If your startup eventually succeeds, it will likely be for reasons you did not initially predict. You must proceed with the attitude of a scientist conducting an experiment, and when you get back the results, you must not argue with them, but rather, you must adjust your mental model of the world. When Sir Alexander Fleming saw that mold on some bread crumbs was keeping bacteria from growing in a petri dish, he said “Astounding! That mold must be producing some substance that kills bacteria! Perhaps that same substance can be used to kill bacteria in humans?” How many of us would be dead right now if he had rejected the evidence, and said simply “That’s impossible! Mold can’t hurt bacteria!” Over the previous 60 years, two other researchers had already noted the lack of bacteria in the presence of certain types of mold, yet they failed to perceive the importance of this observation. An entrepreneur would do well to emulate Fleming’s open mindedness.

Without open mindedness about the type of success you may encounter, your startup is doomed. And without humility about the limits of your knowledge, your startup is doomed.

======================

======================

Comment here or on Hacker News

Source

The Amiga Consciousness

$
0
0

There exists a global community, a loosely knit consciousness of individuals that crosses boundaries of language and artistic disciplines.  It resides in both the online and physical space, its followers are dedicated, if not fervent.  The object and to some extent, philosophy that unites these adherents, is a computer system called the Commodore Amiga (https://en.wikipedia.org/wiki/Amiga).  So why does a machine made by a company that went bankrupt in 1994 have a cult like following?  Throughout this essay I will present to you, the reader, a study of qualitative data that has been collected at community events, social gatherings and conversations.  The resulting narrative is intended to illuminate the origins of the community, how it is structured and how members participate in it.  Game industry professionals, such as the person interviewed during the research for this paper, will attest to the properties, characteristics and creative application of the machine, and how this creativity plays a role in the sphere of their community.  I will examine the bonds of the society, to determine if the creative linage of the computer plays a role in community interactions.

The story of the Amiga and its maker, Commodore, is a long and complex tale, confusing it with a Tolstoy saga could be forgiven.  The purpose of this study is not to retell the origins of the Amiga computer or the demise of Commodore, but instead to look at the people that surround todays close knit global community.

Amiga 3000T

Displaying the internal components
of the Commodore Amiga 3000T.

Home computing was undergoing a revolution during the mid 1980’s, computing power and connectivity, were on the rise while the entry cost into the hobby was dropping.  The market was awash with systems that were all jockeying for pole position.  One system that stood out from the rest was the Commodore Amiga, a system so unique and powerful for it’s time, it had Steve Jobs of Apple Computer nervous.  In 1985, the Apple Mac was limited to a grayscale display, where as the Amiga had color modes that went up to 4096 colors.

Membership is informal and very few User Groups (interacting users based in a similar geographic location) exist that require registration.  This differs from operations in the past.  Local User Groups in the 80’s and 90’s typically required member dues and were operational around the world, frequency of meetings varied from weekly to monthly.  In a much more limited scope, a number of these groups have either survived through the decades or reformed in new capacities, as can be seen at local meetings and their presence at yearly conferences.  The observed population segment that attends meetings and conferences is typically older, averaging from mid 30’s to late 50’s and mostly male.  With exception of smaller User Group meetings, most events that occur are on the scale of 200 – 300 people and cover a wide geographic area.  Conferences are quite affairs, the primary goal is to impart knowledge in a social setting.  The unmistakable hum of old CRT monitors serves as ambient white noise, occasionally punctured by a computer game melody and cheerful laughter.  Some machines are to be observed, from a distance, either they are rare and valuable or delicate and difficult to maintain.  However, these machines were made to be used, and standing alongside the interactive exhibits, their owners are typically ready and more than willing to answer any questions.

Amiga 30th conference

Interactive displays at
Amiga 30 conference.

The nature of the community and format of events enables individuals of all levels to participate how they see fit.  Meetings and larger shows are frequented by members imparting their historical knowledge about the computer, games, demo and BBS (Bulletin Board System) scene.  It’s quite likely some members didn’t make the conscious decision to become affiliated, instead their connection evolved out of their interest in computing, art or music.  For others, collaborating with people of complimentary skills sets, has produced new hardware designs that weren’t thought possible 30 years ago.  Active participation in forums and group discussion helps mold the direction of projects, further adding to the intellectual wealth of the community as a whole.

Spaceballs demo

Spaceballs demo running on the Amiga 500,
a renowned demo of the early 90’s.

Software demos that are seen showcasing the capabilities of the Amiga at conferences or another type of event called “Demo Parties”, are decedents from a programing and art inspired sub-culture called the “Demoscene” (https://en.wikipedia.org/wiki/Demoscene).  The Amiga can be partially attributed to the creation of this related sub-culture.  Individuals with specialized talents in art, audio production and programming, who teamed together to form a group, are collectively known a Demogroup.  Together, the art and effects produced, push the computer to new limits.  Competition between groups was, and often still is, very competitive, with one group trying to out do another with a style of coding technique.  Today, is not uncommon at community events to find the the products of demo parties running on either original 30 year old hardware, or being emulated on a modern laptop.  Programmers are often coding “close to the metal”, that is, the languages they are using, have the minimal amount of interpretation by the computer that require the program to run, they are directly accessing physical parts of the machine.  The simplicity of the Amiga that enables this type of coding, is an incentive to younger generations – the “style” of the machine allows them to show off their skills.  Younger members are forming a solid base in primarily online forums, but also at physical demo parties.  The logical conclusion is that these individuals are one way the community will continue to grow, as the older generations inevitably pass on.

Commodore CDTV

Commodore CDTV on display at Amiga 30.

Let us reference back to the primary assertion: the Amiga computer is a tool that binds creative individuals into a community.  To understand that statement, we must look at how the creative empowerment, enabled by the Amiga, gave rise to  careers in the game industry.  When questioned with: What was your favorite platform to develop on “Back in the day?”.  The response from an interviewed seasoned developer was: The Amiga home computer, a machine with a custom chipset for handling sound, video and I/O (input and output to the computer).  Combined with a low price point, the Amiga was the best choice for game development with it’s powerful graphic capabilities.

Secondly let us consider the response another question: When do you define the “Golden age” of video games? Answer: Probably 1987 to 1988, the C64 was in full swing and the 16bit machines (the Amiga) were just starting to take hold of the market.  Game development teams were growing in size in terms of numbers but they were still small enough for each member to feel the contribution of their efforts.

The underlying message that can be extrapolated: is creativity, an important function for this interviewee.  We can juxtaposition this inferred importance against observations at User Group meetings, to assume that the glue of the community, the reason these individuals are meeting, is the creative capabilities of the machine.  When we position the origins of the Amiga community – what it enabled users to do: coding, art and music, next to the observed creative output that is still being presented at meetings, the conclusion suggests, the forces of attraction to the community are not only a notion of nostalgia for a games machine, but the act of creativity itself.

Dave Haynie

Dave Haynie (right),
former Commodore engineer.

The achievements of the individuals that conceptualized the Amiga computer are highly recognized.  Engineers that worked for Commodore, such as Dave Haynie in the 1980’s and 1990’s along with hardware developers that continue development, command enthusiastic audiences at community events throughout the year.  It has been witnessed through observation at these events their willingness to meet and talk with not only small, intimate groups, but also large audiences.  It could be inferred that these actions not only help preserve the legacy of their work, but they are also functioning as ambassadors for the community.  Their efforts and openness introduce people to the platform who might not have been users during the machines commercial years, and help the community to thrive and expand.

Observations in the field have shown there is a specialized niche for newly produced hardware that typically enhances existing machines or replaces faulty components.  Vendors and technicians present at conferences perform technical services, many of whom do it for the love of the platform, and of course, a nominal fee.  Tucked away in corner locations, surrounded by machine carcasses, toolkits, soldering irons and empty caffeinated beverage cans, engineers can be found laboring on delicate hardware, the long lines of customers imply demand for their skill is high.  This observation of dedication, seen at events and in the online realm, reenforces the notion that individual’s embrace their technical contribution.  Their goals are not solely profit driven, and they are finding their niche in the community with this service.

Families play an important role at conventions, a large diversity of activities are available to entertain younger children that accompany parents.  Finding kids glued to a monitor playing a platform game is a common sight.  Introducing children not only continues the community and provides them with a glimpse of their parents youth, but has the added benefit of helping them understand the core concepts of computing, something which is often difficult to comprehend on modern systems.

To summarize the findings observed during community conferences, meetings, social media engagements and dialog from interviews, the catalysts for community engagement can be identified as:

  • An outlet for creativity– art, music, animation.
  • Intellectual challenge– programming, electrical engineering.
  • Historical connection– familiarity and lengthy community interaction.
  • Nostalgia– Games played in the past, introducing children to component of the parents youth.

With this information, would it be reasonable to speculate, the term “Amiga” not only describes a computer, but also a community who’s collaborations continue to find new ways of expressing art?  It’s a vision or non-tangible quality that cannot be described by the computers physical form of silicon and ABS plastic.  I would postulate that it is not an enormous stretch, to draw the conclusion, that the Amiga community isn’t centered around it’s physical attributes.  Instead, the community is defined as a collective consciousness of creativity and camaraderie, who’s inclusivity is not limited by an individuals own aptitude for any one creative or technical outlet.

Don’t Mess with the Birds

$
0
0

Catskill, New York—the small Hudson River town where the American painter Thomas Cole lived and worked, from 1825 to 1847—is also home to the RamsHorn-Livingston Sanctuary, which contains four hundred and thirty acres of tidal marsh, upland forest, and fallow farmland, and is presently occupied by common loons, great blue and green herons, wood ducks, mallards, a pair of bald eagles, northern harrier and red-tailed hawks, ruffled grouse, merlin falcons, eastern screech and great horned owls, belted kingfishers, pileated woodpeckers, warblers, scarlet tanagers, blue-gray gnatcatchers, a tiny and nervous-looking thrush known as a veery, and various other species of birds whose names, I will admit, are perilously delightful to type. There is also a beaver.

This year marks the centennial of the Migratory Bird Treaty Act of 1918, a U.S. federal law that prohibits anyone from trying to “take, possess, import, export, transport, sell, purchase, barter, or offer for sale, purchase, or barter, any migratory bird, or the parts, nests, or eggs of such a bird except under the terms of a valid permit issued pursuant to Federal regulations.” In essence: don’t mess with birds! Bald eagles, being both the national bird and national animal of the United States, enjoy even more federal protections. If a person is caught pestering one—fussing with its nest, or otherwise interrupting its daily routine of swooping about and collecting fish—she can be fined a hundred thousand dollars, imprisoned for as long as a year, or both. (When the bald eagle was chosen to appear at the center of the Great Seal of the United States, in 1782, Benjamin Franklin was a little salty about the choice. In a letter to his daughter, Sally, in 1784, he derided its hunting methods, which include scavenging and snatching food from other birds. “For my own part I wish the Bald Eagle had not been chosen the Representative of our Country. He is a Bird of bad moral Character. He does not get his Living honestly,” Franklin wrote. He was more enamored of rattlesnakes. “She never begins an attack, nor, when once engaged, ever surrenders: She is therefore an emblem of magnanimity and true courage,” he wrote in 1775, in a letter to the Pennsylvania Journal.)

In November, the Republican congresswoman Liz Cheney, of Wyoming, introduced a piece of legislation that the Audubon Society quickly took to calling “the Bird-Killer Amendment.” It was added to HR 4239, or the SECURE American Energy Act, during a House Committee on Natural Resources meeting, and it would revise the Migratory Bird Treaty Act to better protect energy operators from having to prevent (or be held accountable for) bird deaths caused by oil-waste pits, transmission lines, gas flares, and more. “Our operators take multiple precautions to ensure migratory birds, as well as other wildlife, are not injured during operations, but if these precautions fail, the current language could impose criminal liability for the taking of the bird even though it’s accidental,” Cheney wrote in a press release. Her wording is sort of extraordinary, insofar as it circumvents evoking death directly—“the taking of the bird.” What does it mean? As David Yarnold, the president and C.E.O. of the Audubon Society, wrote in a recent editorial, “Birds are doing their best to find ways to live among people, but they don’t know that an oil pit isn’t a lake and they don’t know how to judge the speed of the blades on wind turbines.”

If Cheney gets what she wants—the bill, with her amendment, is awaiting a vote in the House—oil, gas, and turbine companies will no longer be held financially responsible for butchering avian populations. If this amendment had been added and passed in, say, 2009, B.P. wouldn’t have been legally compelled to spend millions of dollars restoring decimated bird habitats along the Gulf Coast after the Deepwater Horizon exploded and sank to the bottom of the sea.

This winter, I took to roaming the Catskill sanctuary every day after lunch. It’s situated less than a mile from the house where Martin Van Buren married his childhood sweetheart, in 1807, and where the real-life Uncle Sam lived, from 1817 until 1823. (In a terrifically American twist, a section of the house is now a rather intemperate-looking tiki bar.) The sanctuary operates via a partnership between the Audubon Society and Scenic Hudson, a local land-preservation and conservation group. On my walks, I saw dozens of cardinals and yellow-bellied sapsuckers, and the occasional pileated woodpecker, hammering away for beetles. Sometimes I came across little piles of fur and bone—gray remnants of whatever an owl had been pecking at the night before. When the sun hits the tidal marsh from the northwest, around 3 P.M., the cattails sway and glow, as if they’re made of spun gold.

I couldn’t find a bald eagle, though. I would pause excitedly whenever I encountered a splattering of white droppings on the trail, only to gaze longingly up at an unattended nest. Finally, someone told me that the eagles tend to spend their afternoons closer to the river, perching on, or around, the Rip Van Winkle Bridge. There had been abundant sightings farther south, too, between Croton and Verplanck Points—groups of five or more eagles, tossing a white perch back and forth. I didn’t want to bother them merely to raise my binoculars and behold one of their curved yellow beaks. In truth, adult bald eagles look a little mean. There’s something in their eyes that conveys furtive, panicked malice (“Though what bird in the best of circumstances does not look a little stricken?” the writer Lorrie Moore once wondered). When an eagle stretches its legs to snatch prey, it appears nearly bipedal, as if it could handily outpace a grown human in a footrace. Yet the call of an eagle is strangelydocile: a series of high, gasping squeaks. The sound reminds me of Mike Tyson, another renowned Catskill resident (he trained here, in the late eighties, at Cus D’Amato’s KO Boxing Gym, on Main Street). I found the disconnect between eagle squeak and eagle power intriguing, if suspicious.

Although bald eagles are not presently endangered, they are still protected by legislation distinct from the M.B.T.A., and that means that anyone who kills them or interferes with their lives will be punished, regardless of whether or not Cheney’s amendment is passed. (If you wish, you may contact your congressperson to protest the amendment by using this link.) But the M.B.T.A. has worked for a century, dutifully protecting birds against the encroachments of mankind. It’s hard, considering the Treaty’s future, not to feel the familiar ache of resignation: the way lobbyists coerce legislation into being, the way corporate interests are endlessly privileged, the way the difficult, patient work of conservation is often thwarted in favor of easier, faster money.

Eventually, I did encounter a bald eagle. I was standing on the banks of the Hudson, my snow boots sinking into February mud, watching a massive barge go lumbering by. I was thinking something like, Oh! A barge! Its wake was strong enough to displace a few sizable sheets of floating ice, which then rushed toward the shore, making waves. In a moment, I was up to my kneecaps in cold water. As I ran through my curse words and splashed about willy-nilly, I looked up, and there was the eagle: circling, huge, strident. I felt as if I should solemnly raise my hand to my breast and recite the Pledge of Allegiance. Then I thought of the humiliations that the present Administration has inflicted. All the old victories that have been overturned. Now they are coming for the birds.

Human Interest (formerly Captain401) is hiring after raising $11M Series A

$
0
0

Human Interest makes it easy to offer a 401(k). With automated administration and built-in investment advising, we make it affordable to help your employees plan for their futures.

Learn more

Let us take the hassle out of the day-to-day operations of managing your 401(k). We’ll take care of creating employee accounts, processing contributions every pay period and syncing them with your payroll provider, and ensuring that compliance testing and paperwork is completely taken care of.

“Human Interest’s on-boarding process was extremely smooth. We were able to automatically sync all existing employees by connecting our HR management platform which kept data entry to an absolute minimum. Once we officially launched our 401(k) plan with our employees internally, they loved how easy it was to manage themselves and adjust risk and contribution levels without having to work with HR, a broker, or a 3rd party to get it done. Human Interest syncs deduction amounts for employee contributions automatically to our payroll account, this has added zero work or additional steps to our previous payroll process.”

Brady Anderson
CEO and Co-founder

Getting started with a 401(k) can be confusing; we can help your employees decide how much to contribute and how to allocate their assets. We offer automated investment advising through Human Interest Advisors, an SEC-registered investment adviser, at no additional cost.

Through Human Interest Advisors, we also serve as a plan fiduciary, which means we always put your best interests first — and never receive kickbacks from any funds, helping you get the most out of your 401(k) plan.

Learn more about our investment philosophy

For about half of what you might pay with a bigger name financial institution, we give you and your employees more options when it comes to crafting your retirement plan. You can offer Roth, Traditional, 403(b), safe harbor, or profit sharing 401(k) plans, in addition to providing an optional match or vesting schedule.

You may even be eligible for up to $1,500 in tax credits for setting up a new plan.

“When we decided to add a 401(k) benefit, we wanted a service that was easy to use, cost effective and full featured. Human Interest has been a great choice for us today as a startup and tomorrow as we grow in the future.”

Dion Lim
CEO

Learn more about our pricing

Our focus is on you: the small businesses across the United States. Whether your company has two people or two hundred, we stand by our commitment to helping you provide your employees with the most affordable, personalized retirement savings plan possible.

Take it from some of the companies who are already saving with Human Interest:

“We switched to Human Interest because of their technology, user experience, and dedication to HR professionals. As the plan administrator, I am loving the seamless and timely transfer of funds from our account into the employees', the easy rollovers, and countless other user-friendly features!”

Susan Steele
Head of Business Administration

See more client stories
Viewing all 25817 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>