Quantcast
Channel: Hacker News 50
Viewing all 9433 articles
Browse latest View live

Don't Support Information Architects UPDATED - the candler blog

$
0
0

Comments:"Don't Support Information Architects UPDATED - the candler blog"

URL:http://www.candlerblog.com/2013/12/23/no-thanks-ia/


Last week Information Architects (iA) released Writer Pro, a follow-up to the company’s popular text editor, iA Writer. By far, their most heavily touted new feature is Syntax Control. Oliver Reichenstein, iA’s director, promised in a blog post to vigorously protect this new feature:

Syntax Control is a solid innovation, one we’ve been working on for more than four years. As with every serious design, once you have seen how it works, you can figure out cheap ways to copy it. We’ve trademarked and obtained patent pending for Syntax Control. If you want it in your text editor, you can get a license from us. It’s going to be a fair deal.

I’ve read this paragraph probably a dozen times now and I can think of no better word to describe it than “smarmy.” It’s not just the bravado in Reichenstein’s insistence that Syntax Control is such a solid innovation, it’s the pre-emptive accusation that any similar feature in an app would be “cheap.” This isn’t just an insult, it’s a threat.

When I hand my money over to a developer, I want to at least feel like I’m the reason their product exists, that it otherwise wouldn’t but for my interest, support and cash. Goading other developers into forking over licensing fees undercuts that feeling for me. While the full patent application isn’t available yet, Reichenstein tweeted an image that has “Method of editing text in a text editor” listed as the “Title of Invention.” That sounds precisely like the sort of broad software patent that discourages innovation.

But then there’s Syntax Control itself. I can’t figure out what, exactly, the innovation is. Here’s how iA describes Syntax Control on their product page:

Syntax Control dims everything but the chosen syntax, helping you focus, and control your writing style.

On the Writer Pro support forums, Oli Studholme speaks for iA in responding to early adopters unhappy with the app (emphasis not mine):

While we understand Writer Pro is not for everyone, I’m very surprised to hear you say it does “nothing new”. Regardless of your thoughts on Workflow, Syntax Control is not available in any other program, period.

But what about Agile Tortoise’s Phraseology? That two year-old app has a feature called “Inspect” that offers comprehensive statistics about your document like word count and readability. There is also a parts of speech analysis.

Had Agile Tortoise threatened action against anyone who would try to copy Phraseology’s Inspect view, would we even have Writer Pro’s Syntax Control?

All of this leads me to the conclusion that I should stop supporting Information Architects and I suggest you do the same. I bought iA Writer for the Mac and iOS long ago, but from here on out, unless Reichenstein and compnay do an about face, I won’t be giving them a dime. If you like the typefaces they include with their apps, go buy them from Bold Monday and Klim Type Foundry. If you need a text editor there are plenty of others available from less threatening developers. Here are some ideas:1

There is no need to support a smarmy, litigious operation like Information Architects. There is so much innovation coming out of other developers. Now get writing.2

Further reading: Gabe Weatherhead nails it, Ben Brooks offers some insight, The Soulmen whip up a demo showing how simple it is to recreate Syntax Control and Verge forum poster “Weswanders” does the hard work of questioning iA’s claims that The Verge sidestepped in this piece.

UPDATED December 26, 2013: This evening, after a public conversation with David Heinemeier Hansson, iA’s official Twitter account (managed by Oliver Reichenstein) tweeted the following:

We will drop our patents pending. Thank you @dhh for clearing our minds.— iA Inc. (@iA) December 27, 2013

Sounds good to me. I look forward to reading Reichenstein’s side of this.


What is it like to be a tech geek in prison?

$
0
0

Comments:"What is it like to be a tech geek in prison?"

URL:http://www.slate.com/blogs/business_insider/2013/12/26/what_is_it_like_to_be_a_tech_geek_in_prison.html


Inmates at the Mule Creek State Prison on Aug. 28, 2007, in Ione, Calif.Photo by Justin Sullivan/Getty Images

This post originally appeared in Business Insider.

What happens when tech geeks go to prison? It's probably not a question that gets asked around your office every day. But it can happen. A Microsoft executive was charged with insider trading last week, for instance (although he does not face prison time). Shawn Hogan and Brian Dunning, former eBay affiliate marketers accused of defrauding the auction site of $35 million, face up to 20 years in prison.

There is a long history of nerds who used their talents for criminal means rather than professional ones. On Quora, the question-and-answer site, there is a thread that appears to have been written entirely by tech geeks who have spent time in prison—and it's absolutely fascinating. We've excerpted the highlights here, along with some quotes from other Quora threads that address aspects of prison life that might directly relate to tech professionals. The quotes were posted anonymously except where otherwise stated.

This anonymous writer worked in IT consulting before he was sentenced: "It was scary, since I hadn't punched anyone since the seventh grade, and most of the people I might have to fight were 20 years younger than me ... Everywhere you go, you have to be alert. There are so many dangers. You could be in danger if you bump into somebody, if you look at someone wrong, or for no reason at all. I am so much more vigilant of my surroundings, even years later. My ability to read people is greatly improved, because it was so important there."

But you'll also get opportunities.

"Before prison, I liked to play guitar. Inside prison, I got to play in the music program and got pretty good. It was a matter of putting in the time. I also had books sent in so I could study music theory. Before prison, I had six years of junior high and high school Spanish. In prison, I made friends with many people from Spanish-speaking countries and got fluent. I didn't just talk with them; I watched TV with them, studied the Bible in Spanish with them, read novels in Spanish. In those eight years I went from high school Spanish to fluent. I also found a job where I could program computers, creating databases used within the facility for things like tracking sports leagues or scheduling medical appointments. I then had books sent in to study new languages, design patterns, Xtreme and Agile methodologies, and more. I left knowing so much more than when I arrived."

You'll learn something about the way respect works.

"I learned many things from inmates that I never learned in my prior life. I learned that you should go straight to the person you're upset with rather than go to authorities. I learned that giving and keeping your word is the ultimate measurement of character. I learned that loyalty is easy to promise, but few really deliver. Don't be that guy. Prison is really a learning crucible since the reactions are so quick and amplified. If you have annoying habits, you'll find out fast. If you are not respectful to others, you'll hear about it and you may get a 'tune up' to teach you respect."

Yes, they will think older white guys are child molesters.

Mark Conway, former inmate at FMC Devens and now a managing partner at RS Analytics, confirms that the cliche is true: "As my first cellmate used to say about me: 'He kind of strange, but he cool.'  He got life for shooting a snitch in the head, and he was the one to greet me when I took that long walk across the floor, and yes there was laughter and snickering.

"The first assumption that other inmates make is that an older white guy is a pedophile, so the first order of business is showing them your paperwork. Even then, they didn't believe me until I got sent to the camp a few weeks later. Then a doctor decided that camp was 'vacation' for me, and I was recalled back inside the fence. So, when I returned from camp, there was my old cellie waiting for me."

But tech geeks have certain advantages that regular inmates do not.

"But geeks have real value in prison because if you can read, write, type, or research (especially legal work), then you can possibly help them. So, it was a good idea to be cool with me because I helped a lot of people with their motions and communications with the courts. And as long as you showed respect for their life on the streets, then you usually got the same respect in return."

It won't exactly be the Algonquin Roundtable.

Mike Aguilar, a tech Web writer, says: "It really sucks when it's magazine delivery day and your copy of PC magazine shows up.

"And then there's the fact that there's very few people to hold an intelligent conversation with: 'So, what are you in for?'  'Meth. There's a cockroach on the floor.'  'Were you selling it?' 'Yes. And using it. Now the cockroach is burrowing into my skin. KILLITKILLIT!' "

You might get an "office" job.

"No matter who you are on the outside, on the inside you are an inmate. You can be a geek, nerd, a sheep, a thug—it doesn't really matter. You will make friends of all sorts, and those friends will likely last as long as your sentence or theirs if they leave before you. Prison doesn't get easier or harder because of the type of work you did on the outside. Nerds and geeks sometimes get clerk jobs based on their knowledge of computer programs or familiarity with office jobs. That's about the only difference. No matter how smart you are, you are still in prison, and there isn't anything smart, geeky, or cool about that."

While you're inside, do your best to stay educated.

Eric "Phil" Phillips, an inmate at San Quentin, wrote: "At San Quentin it’s a lot easier due to the many different opportunities present here. For example, I work with high-definition cameras and edit video on an Apple at my job at SQTV as well as compose some of the music with my electric guitar (only at San Quentin) and keyboard. I also take calculus at Patten University. Here, there are many ways for one to use their intelligence. At the other institutions, though, it’s a different story. Other than certain specialized jobs in the prison, it can be a mind-numbing experience. I can remember the years of intense, restless, crazy boredom at not being able to compose music, mix it down, and lay down original music, period, but just to daydream about it."

When you get out, you'll face a huge learning curve.

"Having been incarcerated for five years was enough to put me behind the curve. I often ask folks, just to see, what major changes have been wrought since 2007, and interestingly, nobody really knows—but when I was taken into custody, smartphones were only in the hands of the technorati, and the only real "social media" was MySpace. Now it's unavoidable, you're a freak if you don't Facebook—but I don't (can't) do either. I do some social media, sure, via Quora or LinkedIn. But I'm hardly using any of it to its fullest potential, simply because my mind is still running in 2007 technology.

"Worse still, I was a Web designer—so now, when I go out job hunting, I have a huge five-year gap in my design experience. And technology in the design area has moved so much faster. I was clearly a little insane to think I could keep up simply by hand-writing code or by reading whatever materials I could."

Article 27

Rapgenius.com Traffic and Demographic Statistics by Quantcast

$
0
0

Comments:"Rapgenius.com Traffic and Demographic Statistics by Quantcast"

URL:https://www.quantcast.com/rapgenius.com?country=GLOBAL


This chart shows the number of return visits for unique users over the last 30 days.

1. Toggle between visit patterns of Logged In and Non Logged In users. In order to enable the toggle, the publisher must designate that the app has a logged in user base. The Logged In number represents the visit frequency of users that have logged in order to use this app.

3. For example, over the last 30 days, 3,644 unique users visited 4-7 times.

The Top 100 Most popular Scala Libraries | Takipi Blog

$
0
0

Comments:"The Top 100 Most popular Scala Libraries | Takipi Blog"

URL:http://www.takipiblog.com/2013/12/26/the-top-100-most-popular-scala-libraries-based-on-10000-github-projects/


As Scala developers working in a language and ecosystem that’s rapidly growing and evolving, we’re faced with a constant dilemma whenever we write new code – go with that hot new Scala framework that everyone’s talking about, or stick with a Java library we know and trust?

When we began building Takipi we wanted to know what are the most common frameworks developers use today, so we could better optimize it for them. Since a large part of Scala applications are commercial or closed-source in nature, it can be hard sometimes to tell the number of projects putting a library to use.

We decided to use a data based approach to get more insight into this by analyzing what Scala developers are actually using on the world’s largest open project repository – GitHub. With a wide variety of projects ranging from small to very large, GH provides us with an extensive data-set, one which is also highly up-to-date.

Much like with the results we saw in Java, there were some pretty big surprises. As both Java and Scala run on the JVM, it was interesting to notice similarities between the frameworks used, and also some stark differences. Overall 42 libraries appear in both the top 100 Java and Scala libraries, helping reaffirm the fact that Scala isn’t just a different language, but it also has its own universe of tools and libraries.

The Approach

To generate our dataset we queried 10,000 Scala projects, with a bias towards the ones most favorited by the community, as a strong qualifying indicator towards their relative importance.

We searched for dependencies in sbt and Maven which the vast majority of Scala projects on GH use to build their projects. For sbt we analyzed the build.sbt, project/Build.scala and any .scala files that extend them. For Maven projects we scanned the pom.xml dependencies file.

We then analyzed and grouped the results into categories. The results were interesting to say the least -

The Results


Click here to see the complete top 100 Scala libraries list.

TDD is big in Scala. JUnit, the classic Java testing framework, is the most popular library with 2513 projects using it. Scalatest comes in at a close second with 2197 entries. TestNG which is fairly popular in Java (ranked 14th in the Java top 100) isn’t in the top 100 libraries for Scala.

 SPECS2, the framework for writing software specifications is being used by 1331 projects.  SPECS V1 which was deprecated in early 2011 still has 312 projects using it.

A new generation of frameworks. Using Scala is not just about the language, but also about a new generation of frameworks. The Play Framework for building web apps is crushing it when it comes to Scala developers, with 18% of the projects using it. The Akka framework is also doing very well with 776 entries (ranked 9th). Lift, another well known framework for building Scala web applications, is only used by 124 projects, which came as something of a surprise to us.

Some frameworks originally built for Java, however, are seeing much greater use in Scala. The lightweight web server Jetty, which was used by 100 projects in Java, has 4.5X that amount of projects using it in Scala, with 447 entries (17th).

Where’s the Java old guard? This comes in contrast to some of Java’s most venerated languages and frameworks seeing considerable less use in Scala.

  • Spring for example, which places 15(!) libraries in the top 100 Java libraries, isn’t on the Scala top 100 board.

  • Apache commons is also seeing much reduced usage. commons-io and commons-lang, which are both in the top 10 Java libraries, are at #24 and #39 respectively in the Scala top 100.

  • Google’s Guava libraries, which are at #8 in the Java top 100, are also further down the Scala list, coming in at #24 with less than half of projects using it than in Java.


Logging
. Ceki’s SLF4J is leading the pack -

  • SLF4J and logback seems to be the de-facto logging solution for Scala and is being used in 16% and 14% of the projects respectively.

  • log4j, which has 891 projects entries in Java, sees less usage in Scala with only 332 project entries (3%).

  • commons-logging is behind the pack with 105 project entries – that’s less than a third of the number of projects using it in Java.

SQL. Big surprises on the Scala DB front -

  • H2 is the most common Sql DB with 552 projects using it – that’s more than 4X the usage we saw for it in Java.
  • MySql comes in with 387 entries, which is actually more than the 255 entries we saw with Java.

  • Postgre SQL is also up there on the board with 332 entries which is almost 3X more entries than the 121 in Java.

NoSql sees less traction than in Java. It’s also worthwhile noting that Hadoop, which is seeing a good amount of usage in Java, isn’t on the Scala top 100 board. The only NoSql DB on the Scala list is MongoDB with 97 entries.

Android. While Scala is very much a server-side language aimed at building scalable server applications, we still saw some presence for Android development with 82 projects using the sbt-android-plugin.

Surprised by some of the results? We know we were with some of them. Take a look at the full list of the top 100 Scala libraries on GitHub below, and let us know what you think in the comments section. We’d love to hear your thoughts and questions.

The full list – Top 100 libraries for Scala

 

More stuff from Takipi:

 

The definitive list – Java debugging tools you need to know – read more

See the variables values behind every production log error – read more 

 

CI – Know when your code slowed down after deploying a new version – read more 

Serious Science - it's time to get serious

Lekevicius Christmas 2013

Libertarian enclaves: Bitcoin paradise | The Economist

$
0
0

Comments:"Libertarian enclaves: Bitcoin paradise | The Economist"

URL:http://www.economist.com/blogs/schumpeter/2013/12/libertarian-enclaves


A GROUP of self-described anarchists, libertarians and Ron Paul supporters fleeing the crumbling world economic system have founded Galt's Gulch, a community in Chile inspired by Ayn Rand's “Atlas Shrugged”—and with an economy based entirely on Bitcoin. Or that's the goal, anyway.

"Our farm workers and suppliers still want to get paid in pesos,” Ken Johnson, the project’s founder and managing partner, explains. "But Bitcoin as the John Galt coin? Why shouldn't it be?”

If the world economic system "goes sideways," as Mr Johnson puts it, residents will retreat to their self-sufficient gated community, where they will enjoy a shooting range, equestrian facilities, and spa and fitness center. The 6,874-hectare site (pictured) also includes a 100-hectare farm, although it is not clear who will pick the lettuce when the world ends.

Galt's Gulch Chile—a name impossible for local Spanish-speakers to pronounce—will also boast an innovation centre, where expatriate libertarian dentists and chiropractors may ply their trade. In exchange for Bitcoin, of course.

In the event the world economic system fails to collapse on schedule, however, Mr Johnson has a plan B—his new trademark, Galt's Gulch Organics. "The farm came with 65 hectares of lemons," he says. "The US and Japanese markets pay a premium for organic, non-GMO produce." Plans are in the works to plant herbs, spices, fruit, nuts, and vineyards, and organic certification is not far off.

A quirk of Chilean law makes land, mining and water rights independent of each other. Mr Johnson made sure to acquire all three, particularly the water rights. "In the future, wars will be fought over water," he says. Two rivers border the land, and the community sits atop 56 known water wells. Galt's Gulch bottled mineral water may soon be in the offing. Mr Johnson is also building guest haciendas to house not only prospective buyers, but also, he hopes, tourists.

Set in a secluded valley 17 kilometres from Curacavi, Chile, on the road between Santiago and the luxurious beach resort of Viña del Mar, Galt's Gulch is a mere forty-five minutes by car from the Santiago airport, but, as Mr Johnson says, "it feels like you're at the end of the Earth." Yet his goal is not isolationist, he adds. "We're not trying to hide from the world. In fact we want people to find us.”

Indeed, of the 430 lots for sale, only 12% have sold so far, and Mr Johnson is marketing vigorously to the libertarian and Bitcoin communities. Lots are priced in both dollars and Bitcoin, with big discounts for buyers who pay in that crypto-currency. Many early adopters of Bitcoin find themselves sitting on small fortunes, and Mr Johnson hopes to tempt them to diversify into real estate. So far nine clients have paid in Bitcoin, totaling around $1.5m in revenue.

Mr Johnson, a former California real estate agent and evangelist of water ionizers (devices supposed to slow aging and prevent disease, but derided as snake oil by many scientists) has become something of a celebrity in libertarian circles. Authors such as Ben Swann, Josh Tolley, Luke Rudkowski, Bob Murphy, Angela Keaton, Tatiana Moroz and Wendy McElroy have visited the site of his future utopia, and a television production company is pitching a documentary series on the community.

Most buyers so far, he says, are expats or second-home buyers. For Mr Johnson, the appeal is easy to explain. "It's like California, only forty or fifty years ago. Feels like you've stepped back in time.” Mr Johnson plans to break ground in 2014, and estimates five years to fulfill his vision of a place where he can "live and let live, thrive and let thrive.”

Why does he think his project will succeed where similar schemes have failed? "We're a freedom-minded community, but we're not trying to create a sovereign state," he explains. "We pay our taxes, we obey the law. Our goal is to lessen the effect of the rest of the world without telling the world to go take a flying leap."

As for Ayn Rand, just how much have her ideas influenced the community's design? Mr Johnson admits he never finished “Atlas Shrugged”. "I'm not actually much of a reader," he says. "Watched the movie and skimmed the Cliff's Notes, though. Good stuff."


A glimpse into a new general purpose programming language under development at Microsoft | Lambda the Ultimate

$
0
0

Comments:"A glimpse into a new general purpose programming language under development at Microsoft | Lambda the Ultimate"

URL:http://lambda-the-ultimate.org/node/4862


Microsoft's Joe Duffy and team have been (quietly) working on a new programming language, based on C# (for productivity, safety), but leveraging C++ features (for performance). I think it's fair to say - and agree with Joe - that a nirvana for a modern general purpose language would be one that satisfies high productivity (ease of use, intuitive, high level) AND guaranteed (type)safety AND high execution performance. As Joe outlines in his blog post (not video!):

At a high level, I classify the language features into six primary categories:

1) Lifetime understanding. C++ has RAII, deterministic destruction, and efficient allocation of objects. C# and Java both coax developers into relying too heavily on the GC heap, and offers only “loose” support for deterministic destruction via IDisposable. Part of what my team does is regularly convert C# programs to this new language, and it’s not uncommon for us to encounter 30-50% time spent in GC. For servers, this kills throughput; for clients, it degrades the experience, by injecting latency into the interaction. We’ve stolen a page from C++ — in areas like rvalue references, move semantics, destruction, references / borrowing — and yet retained the necessary elements of safety, and merged them with ideas from functional languages. This allows us to aggressively stack allocate objects, deterministically destruct, and more.

2) Side-effects understanding. This is the evolution of what we published in OOPSLA 2012, giving you elements of C++ const (but again with safety), along with first class immutability and isolation.

3) Async programming at scale. The community has been ’round and ’round on this one, namely whether to use continuation-passing or lightweight blocking coroutines. This includes C# but also pretty much every other language on the planet. The key innovation here is a composable type-system that is agnostic to the execution model, and can map efficiently to either one. It would be arrogant to claim we’ve got the one right way to expose this stuff, but having experience with many other approaches, I love where we landed.

4) Type-safe systems programming. It’s commonly claimed that with type-safety comes an inherent loss of performance. It is true that bounds checking is non-negotiable, and that we prefer overflow checking by default. It’s surprising what a good optimizing compiler can do here, versus JIT compiling. (And one only needs to casually audit some recent security bulletins to see why these features have merit.) Other areas include allowing you to do more without allocating. Like having lambda-based APIs that can be called with zero allocations (rather than the usual two: one for the delegate, one for the display). And being able to easily carve out sub-arrays and sub-strings without allocating.

5) Modern error model. This is another one that the community disagrees about. We have picked what I believe to be the sweet spot: contracts everywhere (preconditions, postconditions, invariants, assertions, etc), fail-fast as the default policy, exceptions for the rare dynamic failure (parsing, I/O, etc), and typed exceptions only when you absolutely need rich exceptions. All integrated into the type system in a 1st class way, so that you get all the proper subtyping behavior necessary to make it safe and sound.

6) Modern frameworks. This is a catch-all bucket that covers things like async LINQ, improved enumerator support that competes with C++ iterators in performance and doesn’t demand double-interface dispatch to extract elements, etc. To be entirely honest, this is the area we have the biggest list of “designed but not yet implemented features”, spanning things like void-as-a-1st-class-type, non-null types, traits, 1st class effect typing, and more. I expect us to have a few of these in our mid-2014 checkpoint, but not all of them.

What do you think?

Learn Sanskrit Online

The Burger Lab: How to Make Perfect Thin and Crisp French Fries | A Hamburger Today

$
0
0

Comments:"The Burger Lab: How to Make Perfect Thin and Crisp French Fries | A Hamburger Today"

URL:http://aht.seriouseats.com/archives/2010/05/the-burger-lab-how-to-make-perfect-mcdonalds-style-french-fries.html?daysago=1300


It's time for another round of The Food Lab. Got a suggestion for an upcoming topic? Email Kenji here, and he'll do his best to answer your queries in a future post. Become a fan of The Food Lab on Facebook for play-by-plays on future kitchen tests and recipe experiments.

Golden and delicious. [Photographs: J. Kenji Lopez-Alt]

N.B. I apologize in advance for the length of this post. French fries are a pretty epic subject for me...

I'm gonna come right out and say something that I'm sure you won't all openly agree with: McDonald's french fries are great. At their best, they are everything a french fry should be: salty, crisp, light, and not greasy. Granted, you get the occasional odd franchise that lets'em sit under the heat lamp for a couple hours too long, but on the whole, I find it remarkable that the bigwigs have discovered a way to create a frozen fry that even a one armed eyeless chimp has trouble screwing up. And I know, because they've got one working the fry station at the franchise on my corner.

To be absolutely honest, I've never been able to make fries as good as theirs (shhhhh!). Sure, my thick-cut pub-style fries are super-potatoey and fantastic, and when I'm in the mood for them, my seasoned steak fries can't be beat, but for thin, super-crisp fries (I'm talking the kind that only appear in fast food restaurants and French bistros under the name frites)? I'm always better off running down to the take-out window than bothering to fry them myself at home.

Until now.

I've been literally giddy with the quality of the fries that have been coming out of my kitchen for the last two days. My wife won't hear the end of it. Even my puppy is wondering why his owner keeps exclaiming "Holy s**t that's good!" every half hour from the kitchen. I've cooked over 43 batches of fries in the last three days, and I'm happy to report that I've finally found a way to consistently reach crisp, golden Nirvana.

Follow @ahamburgertoday on Twitter »
Like AHT on Facebook »

The Anatomy of a Perfect Fry

There are a few factors that go into making a perfect fry:

Perfect Fry Factor #1: The exterior must be very crisp, but not tough.

In order to achieve this crispness, the surface structure of a fry must be riddled with micro-bubbles. It's these tiny crisp bubbles that increase the surface area of the fry, making it extra crunchy. Ideally, this layer should only be as thick as it needs to be to add crispness. Any thicker, and you start running into leathery territory.

Perfect Fry Factor #2: The interior must be intact, fluffy, and have a strong potato flavor.

Fries with a pasty, mealy, or gummy interior or even worse, the dreaded state known as "hollow-fry" (when the interior is missing entirely) are an automatic fail in my fry book.

Perfect Fry Factor #3: The fry must be an even, light golden blond

Fries that are too dark or are spotty have an offputting burnt flavor that distracts from the potato. Light golden but perfectly crisp is how I want my fries to be.

Perfect Fry Factor #4: The fry must stay crisp and tasty for at least as long as it takes to eat a full serving.

Fries that comes straight out of the fryer are almost always perfectly crisp. The true test of a great fry is whether or not it remains crisp and edible a few minutes later after its been sitting on your plate. The bendy fry pictured above fails that test.

So how does one going about achieving these goals? The traditional double fry method (once at low temp, then again at high temp) works, but it's far from foolproof, and fails to meet all of the requirements I've set for a perfect fry. For one thing, the fries inevitably come out too brown—some times massively so. For another, they lose their crunch within a few minutes after coming out of the fryer. Clearly the method needs an overhaul. I suppose I could do what the McDonald's Corporation did and spend millions of dollars researching exactly how to accomplish fry perfection time after time anywhere around the world, but unfortunately Serious Eats doesn't pay me well enough to do that. I'm also understaffed, to say the least. So I decided to go with the next best alternative: steal their recipe.

That's much easier said than done.

Hamburgling

Anyone with a buck can get a batch of fully cooked McDonald's fries, but I was after something more. I wanted to get fries from the store in their fully frozen state so that I could examine their surface for clues on how they were parcooked, as well as attempt to fry them myself at home to discover if there is any secret in the fry oil in the shops.

I figured I'd be just be able to walk into the store and order them straight from the cashier.

"Welcome to McDonald's, may I take your order?"

"Yes Ma'am. I'd like a large fries please, hold the cooking."

"Excuse me?"

I know she's already said no in her head, but I press on just the same: "Um... I'd just like the frozen fries please."

"I'm sorry sir, we just don't do that."

Time for some intimidation tactics: "Ok. Could I speak to the manager please?"

"I am the manager."

Sh*t. I bring out the really big guns: "Listen, the thing is, my wife is pregnant—like really pregnant—and she sent me on a quest for McDonald's french fries. But she only likes them really fresh, like straight out of the fryer fresh, so I figured I'd just get some frozen, and fry them for her at home. You know how it is. Women—no accounting for'em, right?"

She remains unimpressed, and needless to say, I go home fry-less, contemplating whether attempting to leverage an unborn, un-conceived son in exchange for a couple dozen frozen potato sticks is grounds for eternal damnation. Thank God I'm an atheist.

In a last ditch effort, I appeal to my Facebook fans for some assistance, promising cold hard cash and full credit in this story to anyone who could get me a stash of frozen McDonald's fries. Within 24 hours, I had received this email from a Grant Held:

Kenji, you put forth an excellent challenge; I enjoy both challenges and your food writing immensely, so I came up with an excellent plan that worked the first try. Getting your frozen fries was simply a matter of finding the right fraternity man; One who had the ability to make up extemporaneous bullsh*t and the all important "charm factor." Some would say possessing these attributes can help you get laid in college, but I plead The Fifth.... The plan involved me printing out a fake list of items needed for a Scavenger Hunt sponsored by "The Simplot Foundation." A "Mr. Simplot" had endowed an annual prize for the winning team of the scavenger hunt, which would be used to fund the "research projects of the members of the winning team each year." (Members also had to belong to the Harold McGee Society and Order of Brillat-Savarin). I walked into the McD's on xxxxxxx. (The exact location has been removed because we don't want to get the manager fired) I had pre-printed a list of items for said made up "Scavenger Hunt" (I basically Googled "Scavenger Hunt Lists" and added "Frozen McDonald's french fries".) I walked in, asked for the manager and explained the scavenger hunt. I said I needed 25 fries, which I was willing to pay for, but they had to be frozen. Her English was not ideal, so I spoke Spanish, and a young associate took kindly upon me and explained what I needed. The manager agreed, but thought I was asking for 25 FREE packages of cooked fries!!! And she was willing to give them to me!!! (She said my accent was great but my grammar was terrible... oh well...) I said I needed FROZEN fries, which really perplexed her, but my young McD's associate friend explained the concept of a scavenger hunt and soon enough I was invited into the kitchen and she grabbed a handful of fries and placed them in the zip lock bag I brought with me.

Grant, you are a genius amongst men, and I am forever in your debt.

The handoff was made the next day, and I finally had a batch of frozen McDonald's fries on which to operate.

Deconstructing the Arches

The first thing I noticed was the surface texture of the fries. They seemed smooth, but on closer inspection, I noticed that they were dotted with tiny tiny bubbles, indicating that they had definitely been fried at least once prior to arriving at the store. I measured them with calipers and found that they were precisely 1/4 of an inch thick. A good size for optimizing crust to interior ratio.

McDonald's used to fry their potatoes in beef tallow, giving them extra flavor and making them extra crisp, but they stopped doing that years ago. But perhaps there's still something magic about their oil? To test this, I fried up a batch of the frozen fries in 375°F peanut oil, letting them cook for about 3 minutes before draining, seasoning, and tasting.

They were just as perfect as the fries at the store. That answers the first question: there is no magic in the oil. Something must be done to those potatoes during the pre-processing that makes them unique.

For the next phase, I started doing some research and caught a lucky break by finding this article online, which essentially runs through the whole process of what goes on in a McDonald's potato processing plant as told by LeAron Plackett, a thirteen-year-long employee. The parts that interested me most were on the second page:

The fries are then flumed out of the A.D.R. room to the "blancher." The blancher is a large vessel filled with one hundred and seventy degree water. The trip through the blancher takes about fifteen minutes... After the fries leave the blancher, they are dried and then it's off to the "fryer," which is filled with one hundred percent vegetable oil. The oil is heated to three hundred and sixty five degrees and the fries take a fifty second dip before being conveyed to the "de-oiler shaker," where excess oil is "shook off."

Bingo.

So McDonald's does indeed use a double fry method, but it's far from the traditional one. Rather than a slow low temperature fry for the first round, the fries get dunked into very hot oil for only 50 seconds (the second fry is then carried out at the actual location). In addition to this, the potatoes get a pre-fry blanching step in hot water. What could the purpose of this be?

To answer that question, it's important to understand exactly what happens when a french fry is cooked.

The Balance of Pectin, Starch, and Simple Sugars

Like all plants and animals, potatoes are composed of cells. These cells are held together by pectin, a form of sugar that acts as a type of glue. These cells also contain starch granules—tiny sacs that resemble water balloons, as well as simple sugars. When these starch granules are exposed to water and heat, they begin to swell, eventually bursting, and releasing a shower of swollen starch molecules. Now the problem is, in order to get the ideal crust, all three of these elements must be in the proper balance, and the proper state. Too many simple sugars, and your potato will brown long before it crisps. If pectin has broken down too much before the starch granules have had a chance to burst and release their sticky innards, your potatoes will either fail to form a crust, will fall apart before it gets a chance to, or in the worst case will cook up completely hollow, like this:

That's not a good thing.

Pre-cooking the fries in a water bath the way McDonald's does accomplishes two goals. First, it rinses off excess simple sugars, helping the fries attain a light gold color, instead of a deep dark brown. Secondly, it activates an enzyme called pectin methylesterase (PME). According to an article in the Journal of Agricultural and Food Chemistry, PME induces calcium and magnesium to act as a sort of buttress for pectin. They strengthen the pectin's hold on the potato cell's walls, which helps the potatoes stay firmer and more intact when cooked to a higher temperature. That's why the surface of a McDonald's fry looks the way it does: rather than blistering into large bubbles like a traditional double-fried french fry does, the reinforced walls form the super-tiny bubbles that give them their extra crunch.

Now, like most enzymes, PME is only active within a certain temperature range, acting faster and faster as the temperature gets higher until, like a switch, it shuts off completely once it reaches a certain level. 170°F is just under that cutoff point.

My objective just became much clearer: in order to get my fries ultra crisp, I'd need to find a way to strengthen their pectin before allowing their starch granules to burst.

Bringing Home the Gold

The most obvious way to do this is just to copy McDonald's exactly: cook the potatoes in a precisely maintained 170°F water bath for 15 minutes. I tried it using my Sous-Vide Supreme, followed by a fry at 360°F for 50 seconds, and a second fry at 375°F for 3 1/2 minutes. It worked like a charm. The fries tasted nearly identical to those that come from McDonald's. Of course, now two new questions entered my head: What about for those poor souls who don't have a temperature-controlled water bath? And more importantly, now that I've got the fries down, could I make them even better? I mean, they taste fantastic now, but we all know that McDonald's fries get soggy pretty darn fast. If these fries were really going to be perfect, I'd have to address that issue.

To solve the first problem, my initial though was to start the potatoes in cold water, and slowly bring it up to a simmer. My hope was that by doing this, they'd spend enough time under the 170°F cutoff point to improve their structure adequately. No dice. The potatoes were certainly better than ones dunked straight into the fryer, but they didn't come close to the originals. Next I tried adding a measured amount of boiling water to a pot containing the cut potatoes. I calculated exactly how much water I'd need in order for it to equilibrate to 170°F. It worked a little better, but the water temperature dropped off too quickly for it to be effective. Was I gonna have to break out the beer cooler for this one? There had to be another way.

That's when I thought—perhaps there is another way to strengthen pectin without having to rely on some fickle enzyme (I've never liked enzymes anyway), and it struck me: apple pie.

What's this got to do with french fries? Well everyone who's ever baked an apple pie knows that different apples cook differently. Some retain their shape, while others turn to mush. The difference largely has to do with their acidity. Thus super tart apples like Granny Smith will stay fully intact, while sweeter apples like a Macoun will almost completely dissolve. Just like a potato, apple cells are held together by pectin. Moral of the story: acid slows the breakdown of pectin.

What if rather than trying to fiddle with temperature, I just relied on the use of acid to help the potatoes keep their structure?

I tried bringing two pots of cut potatoes to a boil side by side, the first with plain water, and the second with water spiked with vinegar at a ratio of one tablespoon per quart. Here's what I saw:

The fries boiled in plain water disintegrated, making them nearly impossible to pick up. When I added them to the hot oil, they broke apart even further. On the other hand, those boiled in the vinegared water remained perfectly intact, even after boiling for a full ten minutes. When fried, they had fabulously crisp crusts with tiny, bubbly, blistered surfaces that stayed crisp even when they were completely cool. As for the flavor, if I tasted really hard, I could pick up a faint vinegary undertone, though I wouldn't have if I didn't know it was there. Even knowing it was there, it wasn't unpleasant at all. After all, I'm used to putting my fries in ketchup or mayo, both of which contain plenty of acid.

This is a picture of one of the fries which I bent a full ten minutes after it had come out of the oil. See how crisp is stays?

Getting Inside the Fluffy Interior

Now that I'd perfected the crust, the final issue to deal with was that of the interior. One last question remained: how to maximize the flavor of the interior. In order to stay fluffy and not gummy, a lot of the interior moisture needs to be expelled in the cooking process, so my goal should be to make this evaporation as easy as possible. I figure that so far, by cooking it all the way to boiling point, I'm doing pretty much the right thing—the more cooked the potatoes are, the more the cell structure breaks down, and the easier it is for water to be expelled. To confirm this, I cooked three batches of potatoes, starting each in a pot of cold, vinegared water, and bringing them up to various final temperature (170°F, 185°F, and 212°F) before draining and double-frying them. Not surprisingly, the boiled potatoes had the best internal structure. Luckily, they were the easiest to make as well.

But was there anything more I could do? I thought back to those McDonald's fries and realized a vital step that I had neglected to test: freezing. Every batch of McDonald's fries is frozen before being shipped out to the stores. I always figured this step was for purely economic reasons, but perhaps there was more to it?

I tried freezing half a batch of fries before frying them and tasted them side-by-side against the other half.

Fries and frozen fries, pre-blanched to various temperatures. Notice how dark the un-blanched fries are due to excess sugars browning.

The improvement was undeniable. The frozen fries had a distinctly fluffier interior, while the unfrozen ones were still ever-so-slightly gummy. It makes perfect sense. Freezing the potatoes causes their moisture to convert to ice, forming sharp, jagged crystals. These crystals damage the cell structure of the potato, making it easier for them to be released once they are heated and convert to steam. The best part? Because freezing actually improves them, I can do the initial blanching and frying steps in large batches, freeze them, and have a constant supply of ready-to-fry potatoes right in my freezer just like Ronald himself!

I know it's bad form to toot your own horn, but I'm simply amazed that these fries have been coming out of my own kitchen. I've been eating fries in various shades of good or bad constantly for the past few days, and I'm absolutely sick of them, yet I am still eating them even as I sit here and type. I really hope my wife doesn't mind greasy keyboards. You never know what's gonna set her off.

For instance—she gets mad when I say things like that about her on completely public forums. Go figure.

Continue here for the recipe for Perfect French Fries »

About the author: After graduating from MIT, J. Kenji Lopez-Alt spent many years as a chef, recipe developer, writer, and editor in Boston. He now lives in New York with his wife, where he runs a private chef business, KA Cuisine, and co-writes the blog GoodEater.org about sustainable food enjoyment.

Architect's Dream House: Less Than 200 Square Feet : NPR

$
0
0

Comments:"Architect's Dream House: Less Than 200 Square Feet : NPR"

URL:http://www.npr.org/2013/12/27/257560971/architects-dream-house-less-than-200-square-feet


Tell Me More

7 min 14 sec

 

A Look Inside Macy Miller's Tiny House

  • Macy Miller

  • Macy Miller

  • Macy Miller

  • Macy Miller

  • Hide caption

    Bathroom

    Macy Miller

You might think going through a divorce and losing your home to foreclosure would be hard to bounce back from, and they are, but Tell Me More caught up with a woman who beat the odds and built a new home for herself.

Macy Miller, an architect from Idaho, built the home with her own two hands at a cost of only $11,000. The house is less than 200 square feet.

Interview Highlights

On building the home

It took 18 months. I had a minor injury — or some might call it a major injury. Yeah, I did break my back. I'm a klutz and I fell off the roof, and it was because I was being incredibly stupid.

On the home she used to live in

I came from a 2,500-square-foot house. You know, four bedrooms, three baths and, you know, I had bedrooms that I literally never even opened. After years, there were still vacuum marks on the floor. It was a little bit too much. It was not really my style at all, and this just works better for me personally.

On the most expensive and difficult part of building the house

The most expensive component in the house is my toilet, actually. I didn't want to put in a sewer line, so I have a composting toilet. And so to put that through all the tests it needs to go through to be regulated and OK'd by jurisdictions, it brings up the price tag on it quite a bit. So that was my most expensive part.

The hardest and probably most daunting part for me was all of my electrical, because I had no experience with electrical whatsoever. I never had any building experience, either. I went to school for design, which is a lot different than building. So wiring the house was scary to me, because if I did something wrong, I could shock myself and hurt myself, or, you know, light it on fire. But ... I just got a book, I read about it, watched YouTube videos. I did it, and then I came and I had a licensed electrician check my work before I covered anything up. So I was happy to find out I did everything just right. It took me a couple times in some spots, but I got it.

On how it feels to live in a tiny home

My house, honestly, it doesn't feel that tiny. The space is laid out in a way that I have a living room, I have a bedroom, I have a kitchen, I have a bathroom. They all function; none of them feels cramped. I mean, two people can cook in my kitchen at the same time. I actually also have a Great Dane that runs around in there. I designed it for him, though, too. I have stairs up to the bedroom. So, like, a lot of people that live in tiny houses have loft spaces, but I wanted him to be able to get up into the bed, and that's where he spends most of his time, honestly.

On whether other people can live in tiny homes, too

There's a whole bunch of people all across the nation right now. It's kind of a do-it-yourself kind of movement, because they kind of get pricey if you have to pay someone else to do them, and, you know, it costs the same as a normal house. So if it costs the same, why would you not just build a normal house? There's people doing this all over. I would say look into it more, research it, and see if it's right for you. It's more of a change in the style of living, and there is quite a bit of going against the norm. You get a lot of naysayers that [say] it's not possible and you can't do it, and you just have to believe in yourself more than that, because it's really not that different.

Happy new year and good-bye bzip2

$
0
0

Comments:"Happy new year and good-bye bzip2"

URL:https://www.kernel.org/happy-new-year-and-good-bye-bzip2.html


2013-12-27 By Konstantin Ryabitsev In Site news.

Good-bye bzip2

We started listing xz-compressed versions of kernel archives in all our announcements back in March 2013, and the time has come to complete the switch. Effective immediately, we will no longer be providing bzip2-compressed versions for new releases of the Linux kernel and other software. Any previously released .tar.bz2 archives will continue to be available without change, and we will also continue to provide gzip-compressed versions of all new releases for the foreseeable future.

So, from now on, all releases will be offered as both .tar.gz and .tar.xz, but not as .tar.bz2. We apologize if this interferes with any automated tools.

Happy new year!

Happy new year to all kernel.org users and visitors. The Linux Foundation and Linux Kernel Archives teams extend their warmest wishes to you all, and we hope that 2014 proves to be just as awesome (or awesomer) for the Linux kernel.

Guide to Leaving your Mac Laptop - Squid's Blog

$
0
0

Comments:"Guide to Leaving your Mac Laptop - Squid's Blog"

URL:http://gigasquidsoftware.com/blog/2013/12/26/guide-to-leaving-your-mac-laptop/


I felt like I was in a controlling relationship headed downhill. After two custom laptops returned for defective hardware, I wanted to leave. But leaving didn’t seem so easy after living in the walled garden of Apple all those years.

This blog post is about how to leave your Mac and return to OSS.

Make a New Plan, Stan

There are quite a few nice alternatives to the Mac Air out there. I decided to go with the newSputnik 3. Some of my reasons:

  • Powerful – New Haswell processor
  • 13.3 inch touch display with 1920 x 1080 resolution
  • Ships with Ubuntu 12.04 (64 bit)
  • Nice design (yes looks are important)

It arrived a couple of days before Christmas. The packaging itself was quite nice. Here is a picture next to my 13 inch Mac Air.

The best was that everything just “worked” out of the box. I had no problems configuring Ubuntu and getting the wireless network hooked up. I could close the lid and reopen it and have “instant on” just like the Mac Air. The keyboard is enjoyable to use and nicely backlit. The sleek design and light weight of the laptop is very comparable to the Mac Air.

Hop on the Bus, Gus

It took my about a day to set up all my programs that I use on a daily basis. Here is a overview:

Application Dock/ Organization – Dash

Ubuntu has a dock on the left hand side of the screen, that is very similar to the mac one. You can right click and pin applications to the dock to keep them in there. Clicking into the dash option, you can browse your applications that are installed.

Getting New Apps – Ubuntu Software Center or apt-get

You can install new applications easily by using the Ubuntu Software Center. Browsing the applications and installing them is point and click easy. If you don’t see the one you need or need a more recent version, you can always install via the command line with

sudo apt-get install package-name

Browser – Firefox or Chromium

Ubuntu comes with Firefox and Chromium installed. You can also go with Chrome of course.

Mail – Thunderbird

Ubuntu comes with Thunderbird mail ready to go. I was pleasantly surprised by how easy it was to setup Thunderbird Mail. You simply put in your email and password. Ubuntu keeps a configuration list of commonly used email providers. It automagically figured out the correct domains and ports to use. On the downside, it doesn’t do anything magic with your contacts. So you are on your own there. I also just found out about Geary, which looks pretty sweet.

Password Management – 1 Password Anywhere + Dropbox / LastPass

There is not a linux client for 1Password. I can still use it by using1PasswordAnywhere. I just have a bookmark to the 1PasswordAnyway link and I haz my logins. I am switching over to LastPass though, so you can edit / add new passwords. There is also an import utility to move stuff over from 1Password.

Emacs

Emacs just works :) It might be just me, but I think it is happier back on Ubuntu. I did an apt-get to get the 24 version.

Git Client

I went with gitg for a graphical Git client. It seems to have all the things you need.

Terminal – Byobu

Byobu Terminal comes already installed in Ubuntu. I have been taking it for a test drive and really like some of the features of easily adding new tabs, splitting screens and re-attaching to sessions.

Evernote/ Everpad

WithEverpad, I can still use all my evernote stuff too.

Presentations – LibreOffice / Reveal.js

I have used Keynote heavily on the Mac. For existing presentations, I can convert them to ppt format and then modify or run in LibreOffice Impress. Most likely with all my new presentations, I will just use a JavaScript framework like reveal.js

Communication – Hipchat / Skype/ Google Hangouts / Campfire

We use Hipchat for messaging at work. Hipchat has a linux client that works just the same. Skype also has a linux client. Of course, Google Hangouts is just fine on the web. I also use Campfire sometimes. There are a couple of linux clients out there, but I haven’t tried them yet. The web version works fine for me right now.

iPhone

On my mac, I used to plug in my phone and sync to my dropbox. I tried plugging in my phone, but unfortunately, iOS7 put in a security feature to that prevents having the phone connect properly. The solution for me is to just use the phone dropbox app to sync the pictures automatically to my Dropbox.

Get Yourself Free

I don’t expect the road to free of bumps. I have only been using my new laptop for a week. But so far, it has been an enjoyable switch. The hardware is really impressive, and it feels good getting back to OSS.

Best of all, I set myself free.

Analysis of SSD Reliability during power-outages


code challenge - Trolling homework questions - sorting - Programming Puzzles & Code Golf Stack Exchange

$
0
0

Comments:"code challenge - Trolling homework questions - sorting - Programming Puzzles & Code Golf Stack Exchange"

URL:http://codegolf.stackexchange.com/questions/16226/trolling-homework-questions-sorting


First of all, dear GiMmEtHaCoDeZ, let's try to break down your task:

Read the numbers Sort them Output the sorted numbers.

As "Divide and conquer" is very important strategy when working with software problems, lets tackle them one at a time

Another important issue in software is versatility. Since it's not specified how the user will input the numbers, that can happen via the console, via a file, via a web service, etc. Maybe even some method that we can't think of at the moment. So, it's important that our solution will be able to accommodate various types of input. The easiest way to achieve that will be to extract the important part to an interface, let's say

public interface IDoubleArrayReader
{
 IEnumerable<double> GetDoubles();
 DoubleArrayReaderType Type {get;}
}

where DoubleArrayReaderType is an enumeration given with

public enum DoubleArrayReaderType
{
 Console,
 File,
 Database,
 Internet,
 Cloud,
 MockService
}

It's also important to make the software testable from the ground up, so an implementation of the interface will be

public class MockServiceDoubleArrayReader : IDoubleArrayReader
{
 IEnumerable<double> IDoubleArrayReader.GetDoubles()
 {
 Random r = new Random(); 
 for(int i =0; i<=10; i++)
 {
 yield return r.NextDouble();
 }
 }
 DoubleArrayReaderType IDoubleArrayReader.Type 
 {
 get
 {
 return DoubleArrayReaderType.MockService;
 }
 }
}

Next, the logical question is how we will know to load the appropriate IDoubleArrayReader into the code. That's easy as long as we use a simple factory:

public static class DoubleArrayInputOutputFactory
{
 private static Dictionary<DoubleArrayReaderType, IDoubleArrayReader> readers;
 static DoubleArrayInputOutputFactory()
 {
 readers = new Dictionary<DoubleArrayReaderType, IDoubleArrayReader>();
 foreach (Type type in Assembly.GetExecutingAssembly().GetTypes())
 {
 try
 {
 var instance = Activator.CreateInstance(type);
 if (instance is IDoubleArrayReader)
 {
 readers.Add((instance as IDoubleArrayReader).Type, 
 (instance as IDoubleArrayReader));
 }
 }
 catch
 {
 continue;
 }
 }
 }
 public static IDoubleArrayReader CreateDoubleArrayReader(DoubleArrayReaderType type)
 {
 return readers[type];
 }
}

Note that, we use reflection to load all active readers, so any future extensions will be automatically available Now, in the main body of out code we just do:

IDoubleArrayReader reader = DoubleArrayInputOutputFactory
 .CreateDoubleArrayReader(DoubleArrayReaderType.MockService);
var doubles = reader.GetDoubles();

Now we need to process, i.e. sort the numbers we have acquired. Note that the steps are completely independent of each other, so to the sorting subsystem, it does not matter how the numbers were inputed. Additionally, the sorting behavior is also something that is subject to change, e.g. we might need to input a more efficient sorting algorithm in place. So, naturally, we'll extract the requested processing behaviour in an interface:

public interface IDoubleArrayProcessor
{
 IEnumerable<double> ProcessDoubles(IEnumerable<double> input);
 DoubleArrayProcessorType Type {get;}
}
public enum DoubleArrayProcessorType
{
 Sorter,
 Doubler,
 Tripler,
 Quadrupler,
 Squarer
}

And the sorting behaviour will just implement the interface:

public class SorterDoubleArrayProcessor : IDoubleArrayProcessor
{
 IEnumerable<double> IDoubleArrayProcessor.ProcessDoubles(IEnumerable<double> input)
 {
 var output = input.ToArray();
 Array.Sort(output);
 return output;
 }
 DoubleArrayProcessorType IDoubleArrayProcessor.Type 
 {
 get
 {
 return DoubleArrayProcessorType.Sorter;
 }
 }
}

Of course, we will need a factory to load and manage the processing instances.

public static class DoubleArrayProcessorFactory
{
 private static Dictionary<DoubleArrayProcessorType, IDoubleArrayProcessor> processors;
 static DoubleArrayProcessorFactory()
 {
 processors = new Dictionary<DoubleArrayProcessorType, IDoubleArrayProcessor>();
 foreach (Type type in Assembly.GetExecutingAssembly().GetTypes())
 {
 try
 {
 var instance = Activator.CreateInstance(type);
 if (instance is IDoubleArrayProcessor)
 {
 processors.Add((instance as IDoubleArrayProcessor).Type, (instance as IDoubleArrayProcessor));
 }
 }
 catch
 {
 continue;
 }
 }
 }
 public static IDoubleArrayProcessor CreateDoubleArrayProcessor(DoubleArrayProcessorType type)
 {
 return processors[type];
 }
}

Nothing much to say here, as this is a process that mirror the input. In fact, we could combine the reading and writing factories into a single DoubleArrayInputOutputFactory, like this:

public interface IDoubleArrayWriter
{
 void WriteDoublesArray(IEnumerable<double> doubles);
 DoubleArrayWriterType Type {get;}
}
public enum DoubleArrayWriterType
{
 Console,
 File,
 Internet,
 Cloud,
 MockService,
 Database
}
public class ConsoleDoubleArrayWriter : IDoubleArrayWriter
{
 void IDoubleArrayWriter.WriteDoublesArray(IEnumerable<double> doubles)
 {
 foreach(double @double in doubles)
 {
 Console.WriteLine(@double);
 }
 }
 DoubleArrayWriterType IDoubleArrayWriter.Type 
 {
 get
 {
 return DoubleArrayWriterType.Console;
 }
 }
}
public static class DoubleArrayInputOutputFactory
{
 private static Dictionary<DoubleArrayReaderType, IDoubleArrayReader> readers;
 private static Dictionary<DoubleArrayWriterType, IDoubleArrayWriter> writers;
 static DoubleArrayInputOutputFactory()
 {
 readers = new Dictionary<DoubleArrayReaderType, IDoubleArrayReader>();
 writers = new Dictionary<DoubleArrayWriterType, IDoubleArrayWriter>();
 foreach (Type type in Assembly.GetExecutingAssembly().GetTypes())
 {
 try
 {
 var instance = Activator.CreateInstance(type);
 if (instance is IDoubleArrayReader)
 {
 readers.Add((instance as IDoubleArrayReader).Type, (instance as IDoubleArrayReader));
 }
 }
 catch
 {
 continue;
 }
 }
 foreach (Type type in Assembly.GetExecutingAssembly().GetTypes())
 {
 try
 {
 var instance = Activator.CreateInstance(type);
 if (instance is IDoubleArrayWriter)
 {
 writers.Add((instance as IDoubleArrayWriter).Type, (instance as IDoubleArrayWriter));
 }
 }
 catch
 {
 continue;
 }
 }
 }
 public static IDoubleArrayReader CreateDoubleArrayReader(DoubleArrayReaderType type)
 {
 return readers[type];
 }
 public static IDoubleArrayWriter CreateDoubleArrayWriter(DoubleArrayWriterType type)
 {
 return writers[type];
 }
}

Finally, our main program will just use all this awesomeness we have already built, so the code will just be:

var doubles = reader.GetDoubles();
doubles = processor.ProcessDoubles(doubles);
writer.WriteDoublesArray(doubles);

where, e.g. we could define reader, writer and processor using

IDoubleArrayReader reader = DoubleArrayInputOutputFactory.CreateDoubleArrayReader(DoubleArrayReaderType.MockService);
IDoubleArrayProcessor processor = DoubleArrayProcessorFactory.CreateDoubleArrayProcessor(DoubleArrayProcessorType.Sorter);
IDoubleArrayWriter writer = DoubleArrayInputOutputFactory.CreateDoubleArrayWriter(DoubleArrayWriterType.Console);

Activists crowdsource escape from North Korea | Al Jazeera America

The Console Living Room : Free Software : Download & Streaming : Internet Archive

$
0
0

Comments:"The Console Living Room : Free Software : Download & Streaming : Internet Archive"

URL:https://archive.org/details/consolelivingroom


The Internet Archive Console Living Room harkens back to the revolution of the change in the hearth of the home, when the fireplace and later television were transformed by gaming consoles into a center of videogame entertainment. Connected via strange adapters and relying on the television's speaker to put out beeps and boops, these games were resplendent with simple graphics and simpler rules.

The home console market is credited with slowly shifting attention from the arcade craze of the early 1980s and causing arcades to shrink in popularity, leaving a small percentage of what once were many.

Through use of the JSMESS emulator system, which allows direct access to these programs in your browser with no additional plugins or settings, these games can be enjoyed again. Simply click on the screenshot or "Emulate This" button for each individual cartridge, and on modern browsers the games will just start to run. As nostalgia, a teaching tool, or just plain fun, you'll find hundreds of the games that started a billion-dollar industry.

These games are best enjoyed in an up to date version of a modern browser. Currently, there is no sound in the games, although that feature will be added soon. Please read carefully regarding key mappings of the games and programs, to use them in your browser.

Simply click on a system below to browse through available games and cartridges and try them out. Where possible, links to manuals and additional information are available for reference.

The Magnavox Odyssey², known in Europe as the Philips Videopac G7000, in Brazil as the Philips Odyssey, in the United States as the Magnavox Odyssey² and the Philips Odyssey², and also by many other names, is a video game console released in 1978. In the early 1970s, Magnavox was an innovator in the home video game industry. They succeeded in bringing the first home video game system to market, the Odyssey, which was quickly followed by a number of later models, each with a few technological improvements (Magnavox Odyssey Series). In 1978, Magnavox, now a subsidiary of North American Philips, released the Odyssey², its new second-generation video game console.

How to be a hacker | Technology | theguardian.com

$
0
0

Comments:" How to be a hacker | Technology | theguardian.com "

URL:http://www.theguardian.com/technology/2013/dec/27/how-to-be-a-hacker


I had signed up to become a hacker for the day.

I had no idea what to expect, or how difficult it might be. But it turned out that the hardest part about taking control of somebody else's computer was just getting my own laptop connected to the internet - which indicates the scale of the security problem that we all face.

Our masterclass was trying to accurately simulate hacking into a decrepit Windows XP computer in the office of a multinational corporation, and Michael Belton, head of the penetration testing team at cybersecurity firm Rapid7, soon had me fully connected. And then the fun began.

“Penetration testing” is a euphemistic term for hacking. The crucial difference is that penetration testing is done with the permission of the network owner, so it is the digital equivalent of stores paying someone to shoplift from them to ensure their security staff are awake.

But if the motivations of the two are different, the methods – and end results – are the same. Which means that a penetration tester showing me the tools of his trade is a pretty good insight into how a script kiddie working with hacker collective like Anonymous goes about their business.

It also neatly answers the question of a Guardian editor who found out I was attending a “hacking masterclass”: yes, it was legal, because we were only accessing systems with the permission of their owners. It’s when you start accessing everyone else’s that the problems begin.

1 We started with Linux

Once I arrived at our hacking venue, where Belton was going to demonstrate how to “own” a computer in just a couple of minutes, I was handed a USB stick with an installation of Kali Linux on it.

Linux is an open source operating system, a collectively-created free alternative to Mac OS or Windows, and Kali is a version of it designed specifically for penetration testers. It comes pre-installed with all the software necessary to take control of unsecured computers (and a good few secured ones as well), as well as all the standard productivity tools a team of testers would need to work together. Most importantly, it can be shrunk down small enough to fit on one thumbdrive – and can be booted straight from it.

That’s crucial for hackers, because although the temptation is to focus on their tools, the job is as much art as science. If you can get physical access to a network, there’s no need to bother trying to bypass firewalls from the outside.

Faking your way into a system 

So penetration testers have been known to dress up as outside contractors, tail employees from smoking breaks, and even picking locks to get in the building. The Ethical Hackers Handbook, a guide for penetration testers, recommends practicing ahead of time the answers to common questions like “I don’t think we’ve met; are you new?” and “Who are you working for?”

The same short-cuts apply elsewhere. If you’re trying to get hold of someone’s password, it’s far simpler to just get them to tell you than it is to crack their computer and read it from the memory.

Again, that comes in many forms. Kevin Mitnick, formerly America’s most-wanted computer criminal before his arrest in 1995, broke into his first major network at the age of 16 by phoning up the company’s system manager. “I claimed I couldn't log into one of ‘my’ accounts, and was convincing enough to talk the guy into giving me access and allowing me to select a password of my choice,” he said in 2003.

These days, people tend to be more suspicious about unexpected phone calls asking for passwords. But there are other ways to achieve the same ends. Belton showed me software Rapid7 has produced which can easily fire off an email to every employee in a company, asking them to log in to a fake version of their own website. The programme automatically strips all the assets from the real site, sets up a temporary server, and waits for people to input their passwords.

The whole thing is so convincing that when the company demonstrated it to a US senator who was visiting their offices, he immediately accused his head of press of being involved, despite having seen the entire process first hand.

2 Finding way in, with Metasploit

But sometimes you just want to remotely take-over a computer. What then?

The first thing to do is look for ways in. There are a number of such discovery tools, from SQLmap, which automatically looks for weaknesses in large databases, to Burpsuite, which is designed to take advantage of web application, but the one we were using was nMap, a type of programme known as a port scanner.

Such applications are often likened to walking down the street, trying every door just to check if one is unlocked, but that slightly underestimates the scale of the thing. Services like nMap are more akin to walking through a city trying every door, window, and loose-looking brick while simultaneously making a note of how many locks they have, what type of key they take, and when it looks like they were built.

After just 45 seconds, the scan was done. It had identified our target: a computer running Windows XP Service Pack 2, released in 2004 and superseded by Service Pack 3 in 2008. (It was technically superseded by Windows Vista in 2007, but we don’t talk about Vista anymore.) Such a setup may seem like our poor sap – in reality a virtual machine running on Belton’s laptop – was being stitched up, but decade-old installations are depressingly common in the business world.

A few more keystrokes, and I launched the program which would get me inside: Metasploit.

The jewel in Rapid7’s arsenal, Metasploit is a one-stop-shop for cracking into computers. The programme itself is over a decade old, but has been steadily updated with new vulnerabilities as time has gone on. It’s never at the cutting-edge, where security researchers are finding new holes, but what it lacks in currency it makes up for in ease-of-use. Even the text-only version which I used (for the real hacker experience, naturally) lets you take over computers with just a few keystrokes; the full paid-for software adds a graphical user interface which can let you seize someone’s laptop with the click of a button.

Like all software for penetration testers, Metasploit has a strong contingent of users who are more interested in just seeing what they can break into. “Let’s be honest, that’s what everyone uses it for,” says a Rapid7 PR sitting in on the masterclass.

With the help of Belton, I picked the particular faulty door which I would make my way through. According to nMap, our target was running a Microsoft program which comes installed on all XP computers and lets them share files back and forth. But version three of the software, which the target had, has a known vulnerability (“a parsing flaw in the path canonicalization code of NetAPI32.dll,” according to Rapid7). Using Metasploit, a single-line command exploits that flaw to load the third and final part of our assault, Meterpreter.

3 Taking control with Meterpreter

Running on the target computer, Meterpreter provides a backdoor through which I can take control of pretty much anything. The program never installs itself, running only in the memory, and only a particularly paranoid target will notice that their task monitor now shows an unexpected, randomly named process. If even that’s too much risk, one further command can “inject” meterpreter inside another programme, so that it stays completely invisible.

While I’m connected to Meterpreter, Metasploit presents me with a list of options. Some, like the ability to dump the contents of the memory or disable the mouse, are designed to let an attacker get further into the target network. The latter is a particularly cunning mix of electronic and human methods: disabling the mouse makes the user call IT support, who may then log in to the computer remotely or in person. Where you originally only had a user account, suddenly you have taken control of an administrator.

Others let you make the most of the access you already have. I can take a screenshot, record audio with a webcam, or livestream video. I can also set up a keylogger, and record everything the target types. If I want to, I don’t have to stop at Meterpreter; I can install further software, to sniff for credit card numbers, or permanently slave the computer to my own – perfect if I need to gather a few thousand together to bring down another site with a distributed denial of service attack, where a server is overwhelmed by the sheer weight of connections and breaks.

How to protect yourself

The scariest thing about it all isn’t what I can do. It’s that it’s me doing it. The software really is that simple.

But a certain extent, that can be reassuring. The vast majority of the hackers we’re all so afraid of are actually doing little more than running a programme which does the heavy lifting for them.

Protecting yourself against them is easy enough:

• keep your computer up to date
• try not to fall prey to phishing attempts
• and don’t run programmes from untrusted sources

When it comes to drive-by hacks like the one I pulled off, you don’t have to be perfectly secure; just more secure than the poor sap who does fall prey. “I don’t have to outrun the bear. I only have to outrun you.”

Majority of Android financial apps have been hacked, research finds

Sherlock Holmes Is in the Public Domain, American Judge Rules

Viewing all 9433 articles
Browse latest View live