{"id":598,"date":"2009-04-24T06:53:06","date_gmt":"2009-04-24T10:53:06","guid":{"rendered":"http:\/\/michaelnielsen.org\/blog\/?p=598"},"modified":"2009-04-24T06:53:06","modified_gmt":"2009-04-24T10:53:06","slug":"biweekly-links-for-04242009","status":"publish","type":"post","link":"https:\/\/michaelnielsen.org\/blog\/biweekly-links-for-04242009\/","title":{"rendered":"Biweekly links for 04\/24\/2009"},"content":{"rendered":"<ul>\n<li><a href=\"http:\/\/scientificconfessions.wordpress.com\/\">Kavan Modi&#8217;s quantum information blog<\/a>\n<ul>\n<li><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/perens.com\/works\/articles\/MorganHill\/\">Bruce Perens &#8211; A Cyber-Attack on an American City<\/a>\n<ul>\n<li>&#8220;Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported.\n<p>That attack demonstrated a severe fault in American infrastructure: its centralization. The city of Morgan Hill and parts of three counties lost 911 service, cellular mobile telephone communications, land-line telephone, DSL internet and private networks, central station fire and burglar alarms, ATMs, credit card terminals, and monitoring of critical utilities. In addition, resources that should not have failed, like the local hospital&#8217;s internal computer network, proved to be dependent on external resources, leaving the hospital with a &#8220;paper system&#8221; for the day.<\/p>\n<p>In technical terms, the area was partitioned from the surrounding internet.&#8221;<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.wdl.org\/en\/\">World Digital Library<\/a>\n<ul>\n<li><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.igvita.com\/2009\/04\/06\/henry-ford-event-driven-architecture\/\">Henry Ford &#038; Event Driven Architecture<\/a>\n<ul>\n<li>Nice metaphor for programming in a distributed environment.<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.ethanzuckerman.com\/blog\/2009\/03\/03\/chinas-complicated-internet-culture\/\">\u00e2\u20ac\u00a6My heart\u00e2\u20ac\u2122s in Accra \u00c2\u00bb China\u00e2\u20ac\u2122s complicated internet culture<\/a>\n<ul>\n<li><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.overcomingbias.com\/2009\/04\/future-incompetence.html\">Overcoming Bias: Future Incompetence<\/a>\n<ul>\n<li>Good question: &#8220;[&#8230;] will those who feel that their superior minds justify their ruling the lives of others accept having their lives ruled by future folk with greatly enhanced minds? &#8220;<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/blog.longnow.org\/2009\/03\/23\/daniel-everett-endangered-languages-lost-knowledge-and-the-future\/\">The Long Now Blog \u00c2\u00bb Daniel Everett, \u00e2\u20ac\u0153Endangered Languages, Lost Knowledge and the Future\u00e2\u20ac\u009d<\/a>\n<ul>\n<li>&#8220;The Pirah\u00c3\u00a3 language has no numbers or concept of counting (only terms for \u00e2\u20ac\u0153relatively small\u00e2\u20ac\u009d and \u00e2\u20ac\u0153relatively large\u00e2\u20ac\u009d); no kinship terms beyond immediate children and parents; no \u00e2\u20ac\u0153left\u00e2\u20ac\u009d and \u00e2\u20ac\u0153right\u00e2\u20ac\u009d (only \u00e2\u20ac\u0153upriver\u00e2\u20ac\u009d and \u00e2\u20ac\u0153downriver\u00e2\u20ac\u009d); no named distinction of past and future (only near time and far time); no creation stories or myths; and\u00e2\u20ac\u201dmost important for linguists\u00e2\u20ac\u201dno recursion.\n<p>A recursive sentence like \u00e2\u20ac\u0153The boy who was fishing owned the dog\u00e2\u20ac\u009d does not occur in the Pirah\u00c3\u00a3 language. They would say, \u00e2\u20ac\u0153The boy was fishing\u00e2\u20ac\u009d and \u00e2\u20ac\u0153The boy owned the dog.\u00e2\u20ac\u009d The eminent linguist Noam Chomsky has declared that recursion is an essential part of human language and is innate. Chomsky\u00e2\u20ac\u2122s former student Everett says that the Pirah\u00c3\u00a3 language proves otherwise. The resultant controversy is profound.&#8221;<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.nytimes.com\/2009\/04\/19\/magazine\/19wwln-domains-t.html\">Stewart Brand &#8211; On the Waterfront &#8211; Interview &#8211; NYTimes.com<\/a>\n<ul>\n<li><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/rjlipton.wordpress.com\/2009\/04\/13\/sat-is-not-too-easy\/#more-1737\">SAT is Not Too Easy \u00c2\u00ab G\u00c3\u00b6del\u00e2\u20ac\u2122s Lost Letter and P=NP<\/a>\n<ul>\n<li>Good overview of some of the basic lower bounds for SAT.<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.nytimes.com\/2009\/04\/13\/business\/media\/13askthetimes.html?pagewanted=12\">Andrew Rosenthal &#8211; Talk to The Times &#8211; The New York Times<\/a>\n<ul>\n<li>Fascinating: &#8220;Frankly, I think it is the task of bloggers to catch up to us, not the other way around&#8230; If the Times editorial board were a single person, he or she would have six Pulitzer prizes; one Emmy; [etc &#8230;]&#8221;.  If the blogosphere were a single person, it would have a half dozen or more Nobel Prizes, at least four Fields medallists, goodness knows how many Emmys, etc.  He&#8217;s fighting a strange battle, arguing essentially that the median New York Times editorial is better than the median blog.  But fights about quality of content are held in the tail of the best material, not in the median.  And in nearly every subject, the Times now has now lost the fight in the tail.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Click <a href=\"http:\/\/delicious.com\/nielsen\/\">here<\/a> for all of my del.icio.us bookmarks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kavan Modi&#8217;s quantum information blog Bruce Perens &#8211; A Cyber-Attack on an American City &#8220;Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes serving the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an&hellip; <a class=\"more-link\" href=\"https:\/\/michaelnielsen.org\/blog\/biweekly-links-for-04242009\/\">Continue reading <span class=\"screen-reader-text\">Biweekly links for 04\/24\/2009<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-598","post","type-post","status-publish","format-standard","hentry","entry"],"_links":{"self":[{"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/posts\/598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/comments?post=598"}],"version-history":[{"count":0,"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/posts\/598\/revisions"}],"wp:attachment":[{"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/media?parent=598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/categories?post=598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michaelnielsen.org\/blog\/wp-json\/wp\/v2\/tags?post=598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}