Berkeley CSUA MOTD:Entry 53254
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2009/8/8-14 [Computer/SW/WWW/Browsers, Computer/SW/Security] UID:53254 Activity:low
8/6     mrauser, what ddya think of this:
        http://www.nplusonemag.com/node/678/print
        \_ Sorta tl;dr.  It seems pretty dense, so I'll read it eventually...
           just haven't really had the time. -mrauser
           \_ yep, it's dense but pretty good. - !OP
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2013/8/22-10/28 [Computer/Companies/Yahoo, Industry/SiliconValley] UID:54732 Activity:nil
8/22    http://marketingland.com/yahoo-1-again-not-there-since-early-08-56585
        Y! is back to #1! Marissa, you are SEXY!!!
        \_ how the heck do you only have 225M uniq vis/month when there
           are over 1 billion internet devices out there?
           \_ You think that every single Internet user goes to Y!?
        \_ Tall blonde skinny pasty, not my type at all -former Y!
	...
2013/6/26-8/13 [Computer/Domains, Computer/Networking, Computer/SW/WWW/Browsers] UID:54697 Activity:nil
6/26    This ones for you psb -ausman
        http://25.media.tumblr.com/027fe67c84c2288cc16e9c85db690834/tumblr_mp0ag8DCQI1qzwozco1_1280.jpg
        \- that's pretty good. i wish someone had put the idea to be before i saw
           it on the internet, so see if i'd have put the 9 justices in the same
           boxes. JOHN PAUL STEVENS >> All the sitting justices. --psb
        \- that's pretty good. i wish someone had put the idea to be before i
	...
2012/4/2-6/4 [Computer/SW/Languages/Java, Computer/SW/RevisionControl] UID:54353 Activity:nil
4/02    We use Perforce at work for revision control. It seems to work okay.
        Lately, a lot of the newer developers are saying that Perforce
        sucks and we should switch to Mercurial or Git. I have done some
        searching on the Internet and some others have this opinion. Added
        advantage is that Mercurial and Git are free. However, there would
        be some work to switch for the sysadmins and the developers.
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/5/8-6/4 [Computer/SW/Unix] UID:54383 Activity:nil
5/8     Hello everyone!  This is Josh Hawn, CSUA Tech VP for Spring 2012.
        About 2 weeks ago, someone brought to my attention that our script
        to periodically merge /etc/motd.public into /etc/motd wasn't
        running.  When I looked into it, the cron daemon was running, but
        there hadn't been any root activity in the log since April 7th.  I
        looked into it for a while, but got lost in other things I was
	...
2011/11/16-12/28 [Academia/Berkeley/CSUA, Computer/HW] UID:54230 Activity:nil
11/16   We'll be taking all CSUA machines offline in the near future for a Soda
        Hall server room reorganization (we're being moved to a neighboring
        server cabinet).  Downtime will hopefully be minimal.  --jordan
        \_ Thanks for all your work keeping the machines running!  It's
           been awesome having soda actually working again.
        \_ Update:  this is tentatively scheduled for Saturday afternoon.
	...
2011/8/9-27 [Computer/SW/Editors/Emacs, Academia/Berkeley/CSUA] UID:54162 Activity:nil
8/9     So I just found out that an old college friend of mine lost her
        four month old daughter to SIDS. What is the correct response here?
        \_ "Did she sleep with her belly?" and "Did you breastfeed?"
        \_ try this joke:
           How do you make a dead baby float?
           ˙ʎqɐq pɐǝp ÉŸo sdooÉ”s oʍʇ puɐ ɹÇ\
	...
Cache (8192 bytes)
www.nplusonemag.com/node/678/print
Against the Machine: Being Human in the Age of the Electronic Mob Spiegel & Grau. The pages in Proust's long novel describing a first-ever telephone call are often admired for their rare sensitivity to the experience of a new technology. The narrator is speaking, across the miles of cable, to his grandmother. alone beside me, seen without the mask of her face, I noticed in it for the first time the sorrows that had cracked it in the course of a lifetime." Proust's passage has no equivalent in any contemporary fiction I know when it comes to an account of a first email read, or first social networking profile posted. Even so, it can't tell us much about what we may really wish to know about technology: never mind losing your virginity--what is it like to live with someone? Proust seems to have recognized that domestication, as the technologists call it, was harder to describe than initiation. In a later volume, he refers in passing to the telephone as "a supernatural instrument before whose miracles we used to stand amazed, and which we now employ without giving it a thought, to summon our tailor or order an ice cream." Marx long ago characterized capitalism in terms of "the annihilation of space by time." But this of course was something different from a description of the experiential weft of a world transformed by the railroad and telegraph. Perhaps the most suggestive and sensitive account of the early industrial compression of space is Wolfgang Schivelbusch's The Railway Journey. It was first published in 1977, or about 120 years after Marx coined his phrase. Still, if today everything else is speeding up, so, maybe, can our understanding accelerate of what is happening to us as senders and recipients of so many almost instantaneously transmitted electronic messages. It's at least the case that some thoughtful books have begun to appear on the subject of our increasing intimacy with the supernatural devices--the laptops, the iPhones, the BlackBerries--at our fingertips. t's far simpler and less expensive to communicate with someone not physically present than at any time in human history. A second palpable change is the ease with which each of us can become an author or publisher." The corollary to this increased ease of communication is of course an increased susceptibility to being communicated with. "Our relentless access to others--and them to us" is how Baron puts it. The grammatical slip (it should be "theirs to us") offers a small confirmation of Baron's fear that a superabundance of text and talk is driving out careful expression. It also suggests how hard it is keeping track of such changes. In 1999, full internet service was made available, in Japan, for the first time on a mobile phone. With the advent of PDAs and smart-phones, you could produce a galaxy of websites from your pocket as a magician draws a menagerie from a flattened top hat; the everywhere of the internet could accompany the anywhere of cellular telephony. In this current decade, an "always-on" model of communication has become the advancing norm. Most internet users in wealthy countries now pay for web access at a flat monthly rate, and many popular mobile phone subscriptions allow you to talk yourself hoarse without incurring surcharges. Notably, the displacement of dial-up by broadband service and continual refinements in microprocessing have permitted the downloading or streaming of large audio and video files. Jenkins himself describes the by now familiar difficulty of buying a mobile phone tout court--"you know, to make phone calls. I didn't want a video camera, a still camera, a Web access device, an MP3 player, or a game system. I also wasn't interested in something that could show me movie previews, would have customizable ring tones, or would allow me to read novels. I didn't want the electronic equivalent of a Swiss army knife." Of course he could have used his new device as a phone and nothing else. But today we find it difficult, even where it remains possible, to order la carte from the menu of our technological choices. Our experience more nearly resembles diving helplessly into an all-you-can-eat buffet: email, texting, G-chatting, phoning; blogs and message boards, newspapers and journals in their on-line editions, novelty and commercial sites of every kind--they are all available all the time. None of this would matter much if we were simply behaving as we did before 1984 (when answering machines began to enter our homes) or 1994 (when people first went online en masse), but with sleeker machinery. Reading the press, watching moving images and listening to recorded music, ordering products from catalogues, talking on the phone, and exchanging correspondence are all modern habits of long standing. The distinction of newer communication technologies is really to promote a intense kind of semiotic promiscuity: more messages are sent and received, and more "content" posted and consumed, while all of these communications--often competing for our attention on one or two screens--tend to become shorter, more frequent, more spontaneous, and more casual. Critiques, as opposed to mere descriptions, of internet culture emphasize the informality or (more judgmentally) the vulgarity of our promiscuous messages. These communications, in their ease, inexpensiveness, and abundance, suffer less pressure than before to be or seem important, meaningful, or definitive--in other words, to last in our minds. In their clamorous competition with one another, they more often strive to be the first noticed. The critic and erstwhile blogger Lee Siegel, in Against the Machine, a polemic against online habits, makes a list of "five open supersecrets" about bloggers: 1 Not everyone has something valuable to say. Bloggers on the whole write carelessly, their ideas are commonplace, they curry favor with readers and one another, and their popularity is no index of their worthiness. Siegel quotes Spinoza: "All things excellent are both difficult and rare." This seems inarguable, even if Siegel's preference for professional skill and authority against the digital canaille leads him to champion the execrable '90s sit-com Friends over an innocuous televised talent show like American Idol. In the days before the internet, he claims, "The audience for each medium knew its history, tradition, and development.... The creators of Friends knew the Dick Van Dyke show": a curious nostalgia. Still, the vulgarity of online life is impossible to deny. It seems merely bizarre when Henry Jenkins defines "lowest common denominator" as the "common idea that television programs appeal to basic human drives and desires--most often erotic or aggressive," as if TV had anything on porn sites or the comments sections of blogs when it comes to the solicitation of lust or anger. Digital life also clearly undermines the patience with which people used read and write. Naomi Baron proposes the notion of a linguistic "whateverism" abetted by email, instant messages, blogs, and texting: "The proliferation of writing, often done in a hurry, may be driving out the opportunity and motivation for creating carefully honed text." She recalls one of her students claiming that anything worth saying could be said in fewer than thirty pages, and quotes a fellow professor: "I can't get my students to read whole books anymore." Both Siegel and Baron are plainly describing and ruing the same condition, one that is obvious to all of us. What may be less obvious is that its chief characteristic appears to be a lack of mental discipline. n the internet, an impulse is only seconds away from its gratification," while Baron cites with approval neuroscientists who "suggest a strong kinship between the effects of multiple pulls on our attention (thanks to information communications technologies) and attention deficit disorder." As anybody with a router can attest, this tendency toward distraction and desublimation is for real. A writer is someone for whom writing is more difficult than for others; what has been written without effort is generally read without pleasure; But if jabbering semiotic promiscuity entails some f...