Nexus 10 $399 to $499

Google bags the launch and announces its new hardware anyhow:

Hurricane Sandy can’t hold Google (GOOG) down, as the company has just gone ahead and unveiled the Nexus 4 smartphone and Nexus 10 tablet even though its press conference was canceled. Nexus 4 specs include a 4.7-inch True HD IPS Plus display with 1,280 x 768-pixel resolution, an 8-megapixel camera, a Qualcomm Snapdragon S4 Pro processor, 2GB of RAM and Android 4.2 Jelly Bean. The phone starts at a shockingly affordable $299 without any contract or subsidies, and it will launch in the United States on November 3rd.

The Samsung (005930)-built Nexus 10 tablet sports a 2,560 x 1,600-pixel display with a pixel density of 300 PPI, a dual-core 1.7GHz Samsung Exynos chipset, 2GB of RAM, NFC and a 5-megapixel camera. Pricing starts at $399 with 16GB of storage and tops out at $499 for the 32GB model, and both will launch on November 3rd alongside the Nexus 4.

Not quite as aggressively competitive as I’d thought, but it doesn’t sound bad at all.  I’m just hoping that they got the fragile screen issue from the Nexus 7 resolved.


The idiot assimilators

Sara Hoyt has a legitimate complaint about Facebook and the mindless Faceborg who successfully attempt to enlist unwitting others in their cherished causes:

People with zero affiliations with — or even knowledge of — particular
groups are publicly made members of them without their consent. All it
takes is a friend putting you in a group, and then you are in it without
your consent….

There is something downright Orwellian about this, and if you don’t
think it can be used for Orwellian political purposes, imagine yourself
working in an office with Facebook friends who include supporters of a
presidential candidate for whom you don’t intend to vote. If that
“friend” puts you in, say, an “I’M VOTING FOR JILL STEIN!” Facebook group, then you are in it, and you have to un-join. Suppose
your supervisor or next door neighbor put you in it? The implications
are as obvious as they are odious; not all of us are political junkies
with the balls to issue public statements about whom we support or don’t
support, and not all of us are so public that we might find something
like this amusing enough to write a blog post about the experience.

Now, I’m not active on Facebook.  While I do use Twitter, I only belong to most social media groups in order to prevent my more creative critics from attempting to pass themselves off as me.  But I am a registered user there, and so every day I am the recipient of spam from groups like Friends of Protection For Men.  Not only is the constant barrage of email annoying, but it has the counterproductive result of making me feel entirely unsympathetic to the Friends of Protection For Men.  Every time I see another stupid piece of mail from them it makes me want to kick the sender in the teeth.  Not that I often see one, of course, since my spam filter is cranked up to 11, which is why I occasionally fail to receive legitimate emails from readers attempting to contact me.  But I just looked in my Junk folder, and sure enough, there are a pair of emails from the wretched Friends that arrived this morning.

So, for the first time in ages, I logged onto Facebook and removed myself from the various groups into which others have conscripted me.  But, as Miss Hoyt points out, I shoudn’t have to do that.  Opt-out is reprehensible and opt-in should always be the standard.

I appreciate that Facebook and other social media can be a useful means of contacting individuals and organizing groups.  But don’t ever sign people up for causes that you believe to be worthy, even if you are 100 percent sure that they agree with the goals of that group.  It’s just obnoxious, and to be honest, Mark Zuckerberg should be repeatedly punched in that flat, stupid, thieving face of his for his refusal to prevent Faceborg from assimilating others.


The need to restrict drone use

Those discussing the use of killer drones, both pro and con, at the New York Times somehow managed to completely fail to consider the two most problematic aspects of their use:

One point in favor of drone strikes is that they are weakening Al
Qaeda, the Taliban and affiliated groups, and hence protecting lives,
American and other.

Also, there don’t seem to be better means of doing
so.

Points against drone strikes are the cost in civilian lives, the
alienation of parts of the Islamic world, potential harm to the
authority of international law, and the possibility that drone use will
spread around the world, generating more conflict and harming long-term
U.S. interests.

These are all valid points, and I respect that reasonable people
could be convinced by either set. My own reasoning turns on four
arguments.

  1. First, states have a primary responsibility for the protection of
    their own citizens. If drone strikes are the best way to remove an
    all-too-real threat to American lives, then that is an especially
    weighty consideration.
  2. Second, I doubt that ending drone strikes would substantially reduce
    anti-Americanism in the Islamic world or put a dent in radical
    recruitment.
  3. Third, the U.S can do a lot to moderate some harms caused by its use
    of drones. By being clearer about what it’s doing and offering detailed
    legal justification, the U.S. could mitigate damage to international
    law and the threat of uncontrolled proliferation.
  4. Finally, there is evidence that drone strikes are less harmful to
    civilians than other means of reaching Al Qaeda and affiliates in
    remote, lawless regions (for example, large-scale military operations).

There are two serious problems with the use of drones overseas, both of which outweigh their potential benefits.  First, it has successfully established a precedent for using them domestically for routine law enforcement.  Second, and more problematic, the administration has foolishly granted a comprehensive justification for the use of drones by foreign forces against Americans on American soil.  When foreign militaries acquire access to drones, and they will, the US will find little sympathy from other nations when the equivalent of Hellfire missiles begin raining down on New York and California.

And the threat of disproportionate response won’t necessarily be a convincing deterrent, because clever attackers will be careful to disguise who is piloting the drone.  An Iranian drone might actually belong to China.  A Chinese drone might actually be utilized by American rebels… or by China making it look like American rebels.  The widespread use of drones is a very foolish move on the part of the U.S. Commander-in-Chief and can be safely expected to result in some serious blowback.


Bombs before GDP

Karl Denninger considers the problem of energy production in a world of increasingly expensive oil and coal:

We experimented with Thorium as a nuclear fuel in the 1950s
and 1960s.  Carried in a molten salt there are a number of significant
advantages to this fuel cycle.  Chief among them is that the reactors
operate at atmospheric pressure, have a strongly-negative temperature
coefficient (that is, reactivity drops as temperature increases) and
because they operate with their fuel dispersed in the coolant and rely
on a fixed moderator in the reaction vessel shutting them down is
simply a matter of draining the working fuel into a tank with sufficient
surface area to dissipate decay heat.
  This can be accomplished
passively; active cooling of a freeze plug in the bottom of the reactor
vessel can be employed during normal operation and if for any reason
that cooling is lost the plug melts, the coolant and working fluid
drains to tanks and the reactor shuts down.  In addition thorium is about as abundant in the environment as is lead, making its supply effectively infinite.

Finally, these reactors operate at a much
higher temperature; the units we have run (yes, we’ve built them
experimentally in the 1950s – 1970s!) run in the neighborhood of 650C. 
This allows closed-cycle turbine systems that are more efficient than
the conventional turbines in existing designs, making practical the
location of reactors in places that don’t have large amounts of water
available.  That in turn means that the risk of geological and other
similar accidents (e.g. tsunamis!) is greatly reduced or eliminated. 
Finally, the fuel cycle is mostly-closed internally;
that is, rather than requiring both fast-breeder reactors and external
large-scale reprocessing plants to be practical, along with a way to
store a lot of high-level waste these units burn up most of their
high-level waste internally and produce their own fuel internally as
well as an inherent part of their operation.

So why didn’t we pursue this path for nuclear power?

That’s simple: It is entirely-unsuitable for production of nuclear bombs as it produces negligible amounts of plutonium.

A decision that might have made sense in the middle of the 1950s arms
race doesn’t make sense more than 60 years later.  So, why aren’t we
utilizing thorium-based nuclear power plants?


Apple’s high water mark

All declines have to begin from a high, and with regards to Apple, it would appear to be all downhill from here.  A few weeks ago, I ranted about the way Apple’s walled garden and forced upgrade approach was being adopted by foolish technology companies.  Two of our four Kobos ended up bricked, both due to the same buggy updated firmware; I could have avoided bricking the second one were I not inadvertently forced into an unwanted update by the computer software.

Apple was able to get away with this very risky strategy due to it being run by a perfectionist, detail-oriented, technofascist.  It didn’t matter if the updates were forced, because anyone working for Steve Jobs was going to be triple-damn certain that the updates would work properly… or at least not contain any fatal bugs.  Now that Jobs is gone, it doesn’t surprise me in the least that Apple is running into the same kind of bugs that plague most of the other companies that stupidly tried to imitate it.  I received this email from a friend of mine who was so bold as to update his iPhone to iOS 6:

I updated my iphone to IOS6 last night. New
app appeared called ‘passbook’ which apparently is ‘the simplest way to
get all your passes in one place’ … except it doesn’t connect to the
itunes store. Also I found I had lost
all my playlists from my music … this also happened to a friend but his
have since automagically reappeared … mine haven’t so far!

It’s now been two days and he is still missing his playlists.  Not a big deal, hardly a fatal bug, and yet likely indicative of more serious problems to come in the future.  Meanwhile, Karl Denninger notes that Apple has forced its users to give up Google Maps in favor of its own lower-quality map software.  It’s far too soon to pronounce final judgment, but these recent events tend to bolster my expectation that the second post-Jobs era at Apple is not going to go any better than the first one did.


What could go wrong?

One of the minor problems with being forced into a centralized data system is that you have to assume that the centralizer is as careful with your data as you are. Which, of course, is seldom the case:

Apple faced a major embarrassment on the eve of the launch of its new iPhone when hackers published a trove of sensitive information about 1m Apple devices online. The hacker group AntiSec, an offshoot of the Anonymous and Lulzsec collectives which last year targeted Sony, News International and others in a high-profile wave of attacks, said it had obtained the database of Apple device-identifiers from an FBI agent’s laptop.

The hackers claim this is just a sample from 12m records, which they say include the full names, street addresses and mobile phone numbers of owners of Apple’s iPhones, iPads and iPod touches. Several security researchers verified the published data are genuine, but said they present little risk to the people involved as long as the other details are not released.

Antisec should go ahead and release the whole kit and kaboodle. Perhaps the fanbois will finally learn a salient lesson concerning the wisdom of trusting Apple, Facebook, Google, or any other company attempting to utilize the walled garden model.

If you’re an Apple user who wants to find out if your device was compromised, The Next Web has created an online tool that lets you do so if you know your UDID.


Blogger and the Apple Vay

You vill have it our vay. You vill not have it your vay no more, hein? Your vay is old and schlecht. Our vay ist neu and gut and you must to use it so zat alles ist in ordnung!

The old Blogger interface will be removed in the coming days.

We’ve made many improvements to the new Blogger interface.

You can upgrade to the new interface at any time.

The thing is, I don’t want to upgrade to the new Blogger interface. I tried it. And I disliked it. So I went back to the old one, only now they are taking that option away from me. And for what? So Blogger’s engineers can feel as if they have something to do? How does forcing all their bloggers to use the new interface benefit Blogger in any way?

Now, the new interface isn’t absolutely awful, so I’m not going to drop Blogger over it, but it adds absolutely nothing as far as I’m concerned. It’s not as if I’m a Luddite, as I use the new Blogger template at Alpha Game and even tried twice – and failed twice – to use it to recreate the functionality of this blog. But I truly do not understand why so many technology companies insist on not only fixing things that are not broken, but forcing their users to adopt the “New and Improved” versions.

This is especially problematic when the forced upgrade actually breaks the product and there is no way to go back to the previous version. The last Kobo upgrade actually bricked two out of the three eReaders. Apple can get away with this sort of thing because it was run by an insane perfectionist. But I suspect disaster eventually looms for any company that forces upgrades, because it is an excellent way of creating the possibility of losing all of your customers simultaneously.


The Apple-Samsung debacle

It would appear fairly obvious that Apple’s patent infringement award will not only be appealed, but reversed and thrown out.

Apple v. Samsung juror Manuel Ilagan said the nine-person jury that heard the patent infringement case between the companies knew after the first day that it believed Samsung had wronged Apple…. The decision was very one-sided, but Ilagan said it wasn’t clear the jurors were largely in agreement until after the first day of deliberations.

“It didn’t dawn on us [that we agreed that Samsung had infringed] on the first day,” Ilagan said. “We were debating heavily, especially about the patents on bounce back and pinch-to-zoom. Apple said they owned patents, but we were debating about the prior art [about the same technology that Samsung said existed before the iPhone debuted]. [Velvin Hogan] was jury foreman. He had experience. He owned patents himself. In the beginning the debate was heated, but it was still civil. Hogan holds patents, so he took us through his experience. After that it was easier. After we debated that first patent — what was prior art –because we had a hard time believing there was no prior art, that there wasn’t something out there before Apple.

“In fact we skipped that one,” Ilagan continued, “so we could go on faster. It was bogging us down.” …

“Once you determine that Samsung violated the patents,” Ilagan said, “it’s easy to just go down those different [Samsung] products because it was all the same. Like the trade dress, once you determine Samsung violated the trade dress, the flatscreen with the Bezel…then you go down the products to see if it had a bezel. But we took our time. We didn’t rush. We had a debate before we made a decision. Sometimes it was getting heated.”

Regardless of what you think of patents or Apple, the fact that the jury didn’t even look at all the prior art should be sufficient to get a judge to look at this again. And the jury foreman sounds like an Apple plant, or at least fanboi.


Rotten to the core

In case you are wondering, not only is Apple an intrinsically evil, technofascist company, but the Apple Geniuses are even bigger tools that you likely imagined:

It was bad, and it wasn’t just a bunch of young punks working the system; the corruption rained down from above and pooled deep at the bottom.

Jake and Ronald both spoke with smiles and contempt about their former boss-of-bosses, a regional manager from Apple corporate who they allege ran the store like it was her own personal playground. Jake says the rest of the gang wasn’t much better. “It bends my brain to know that, statistically speaking, it’s harder to get a job at the Apple Store than it is to get into some Ivy League schools,” he says. “Yet somehow they’re staffed by some of the most inept people this side of mastering the ability to speak.”

I liked Apple a lot better back in the //e days.


Anklebiters will bite

Requiring real names does not reduce unwanted comments:

YouTube has joined a growing list of social media companies who think that forcing users to use their real names will make comment sections less of a trolling wasteland, but there’s surprisingly good evidence from South Korea that real name policies fail at cleaning up comments. In 2007, South Korea temporarily mandated that all websites with over 100,000 viewers require real names, but scrapped it after it was found to be ineffective at cleaning up abusive and malicious comments (the policy reduced unwanted comments by an estimated .09%).

I think some people fail to understand why I delete anonymous comments. There are two reasons. The first is that it is difficult to keep track of who is saying what when there are multiple anonymous commenters. The second is that if you can’t be bothered to take the three steps required to click Name/URL, enter a name, and click okay, the chances that you are going to say anything that requires notice are nil.

I’m not saying that it is necessary to register with anyone or provide your real name, the point is to maintain a consistent identity so that people can connect one comment with another. But that identity need not be linked to your actual identity. The ineffectivness of requiring real identities in nominal pursuit of civility is useful information, however, because it demonstrates that the real object of the campaign against Internet anonymity is something other than civility.