How a Massachusetts man invented the global ice market

To this day, Europeans rarely put ice in their drinks, but Americans do. Thanks to the low price of ice in the United States, Rees said, people here “developed a taste for cold drinks faster and stronger than anyone else.” This required active involvement from Tudor, who sent operatives to go from bar to bar trying to convince owners to incorporate his product into drinks. To make the sale, Tudor committed to giving some bartenders free ice for a year, figuring that customers would so enjoy the clink in their glasses that other local bars would feel pressure to put in orders. “The object is to make the whole population use cold drinks instead of warm or tepid,” Tudor wrote in his diary. “A single conspicuous bar keeper…selling steadily his liquors all cold without an increase in price, render it absolutely necessary that the others come to it or lose their customers.” According to Gavin Weightman, who wrote a 2003 book about the New England ice trade, Tudor was celebrated for half a century after his death by scholars at the Harvard Business School, who “admired him for creating a demand where it didn’t exist before.”

via How a Massachusetts man invented the global ice market – Ideas – The Boston Globe.

The Evidence That North Korea Hacked Sony Is Flimsy

Attribution Is Difficult If Not Impossible

First off, we have to say that attribution in breaches is difficult. Assertions about who is behind any attack should be treated with a hefty dose of skepticism. Skilled hackers use proxy machines and false IP addresses to cover their tracks or plant false clues inside their malware to throw investigators off their trail. When hackers are identified and apprehended, it’s generally because they’ve made mistakes or because a cohort got arrested and turned informant.

Nation-state attacks often can be distinguished by their level of sophistication and modus operandi, but attribution is no less difficult. It’s easy for attackers to plant false flags that point to North Korea or another nation as the culprit.

via The Evidence That North Korea Hacked Sony Is Flimsy | WIRED.

A list of previous Sony Hacks here.

Sony Hackers ‘Completely Owned This Company’

“It’s really a phenomenally awesome hack—they completely owned this company,” Schneier, who is regularly consulted by the federal government on security issues, said. “But, I think this is just a regular hack. All the talk, it’s hyperbole and a joke. They’re [threatening violence] because it’s fun for them—why the hell not? They’re doing it because they actually hit Sony, because they’re acting like they’re 12, they’re doing it for the lulz, no one knows why.”

via Bruce Schneier: Sony Hackers ‘Completely Owned This Company’ | Motherboard.

Unless you know how infiltrators got into Sony’s system there is no way figuring out the who behind the hack.  So far details of this has been lacking and as far as potential culprits targeting Sony, North Korea is probably least capable from an education standpoint and logistics.  Social engineering, getting people inside Sony to cooperate is usually behind successful infiltrations.  Sony’s Playstation network was taken down awhile ago.  I suspect whoever did that probably is behind this despite what movie is about to be released soon.

Touring A Carnival Cruise Simulator: 210 Degrees Of GeForce-Powered Projection Systems

Overall, this was a fascinating example of how improvements in GPU hardware have allowed companies to build simulation centers that weren’t really possible before. Shipping companies and airlines have used some type of simulation for decades, but the type and nature of the environments those simulations can include is rapidly expanding — and such improvements at the industrial scale inevitably trickle down to consumer hardware and applications.

via Touring A Carnival Cruise Simulator: 210 Degrees Of GeForce-Powered Projection Systems.

What Can A Raspberry Pi Do In Space?

The Astro Pi board is a Raspberry Pi HAT and will comprise the following:

  • Gyroscope, accelerometer and magnetometer sensor
  • Temperature sensor
  • Barometric pressure sensor
  • Humidity sensor
  • Real time clock with backup battery
  • 8×8 RGB LED display
  • Several push buttons

It will also be equipped with both camera module and an infra-red camera.

via Astro Pi – What Can A Raspberry Pi Do In Space?.

During his mission Tim Peake will deploy the Astro Pis, upload the winning code whilst in orbit, set them running, collect the data generated and then download it to be distributed to the winning teams.

Marines dump Microsoft for Linux OS on Northrop Grumman radar

In a statement released Friday, she said Microsoft Windows XP is no longer supported by the software developer and the shift to a DOD approved Linux operating system will reduce both the complexity of the operating system and need for future updates.

via Marines dump Microsoft for Linux OS on Northrop Grumman radar – capitalgazette.com.

Apple, IBM partnership yields first results: 10 mobile apps

The plan calls for IBM will resell Apple devices with its software pre-installed. IBM activation, management and security software are also involved in the deal. The partnership aims to give Apple the credibility it still has not quite achieved in IT departments and bring IBM into a popular mobile ecosystem.

via Apple, IBM partnership yields first results: 10 mobile apps | ITworld.

how to calculate packet loss from a binary TCPDUMP file

You can measure packet retransmits from the client to the server by counting the number of duplicate sequence numbers.

Packet retransmits from the server to the client can be measured by counting duplicate Ack numbers.

Note that a retransmit is triggered by more than just total loss (= timeout); if the remote machine rejects the packet, or the packet is corrupted, the local machine must also retransmit.

via networking – how to calculate packet loss from a binary TCPDUMP file – Server Fault.

I needed a way to measure this on a wifi network where packet loss can be very high and bursty.  This answer seems relatively simple to implement — just store off  ACK sequence numbers into an array of limited size and count how many times every new ACK matches in that array.  By monitoring this count I can determine where and when certain areas are getting bad and perhaps alert or alarm based upon a certain threshold.

Kepler’s Three Laws

Kepler’s three laws of planetary motion can be described as follows:

  • The path of the planets about the sun is elliptical in shape, with the center of the sun being located at one focus. (The Law of Ellipses)
  • An imaginary line drawn from the center of the sun to the center of the planet will sweep out equal areas in equal intervals of time. (The Law of Equal Areas)
  • The ratio of the squares of the periods of any two planets is equal to the ratio of the cubes of their average distances from the sun. (The Law of Harmonies)

via Kepler’s Three Laws.

Pluto-bound spacecraft ends hibernation to start mission

New Horizons is now so far away that radio signals traveling at the speed of light take four hours and 25 minutes to reach Earth.

The scientific observation of Pluto, its entourage of moons and other bodies in the solar system’s frozen backyard begins Jan. 15, program managers said. The closest approach is expected on July 14.

via Pluto-bound spacecraft ends hibernation to start mission | Reuters.