Genre Computers. Page - 4
This "borrowing" was nothing unique, either for Disney or for the industry. Disney was always parroting the feature-length mainstream films of his day.3 So did many others. Early cartoons are filled with knockoffs--slight variations on winning themes; retellings of ancient stories. The key to success was the brilliance of the differences. With Disney, it was sound that gave his animation its spark. Later, it was the quality of his work relative to the production-line cartoons with which he competed. Yet these additions were built upon a base that was borrowed. Disney added to the work of others before him, creating something new out of something just barely old.
Sometimes this borrowing was slight. Sometimes it was significant. Think about the fairy tales of the Brothers Grimm. If you're as oblivious as I was, you're likely to think that these tales are happy, sweet stories, appropriate for any child at bedtime. In fact, the Grimm fairy tales are, well, for us, grim. It is a rare and perhaps overly ambitious parent who would dare to read these bloody,
nger use .date to distinguish kernel builds. It was too frustrating to have 030627a, 032627b (etc) as I tried to figure things out. I now use names, in alphabetical order, starting with the kernel build "alien". I'm going to leave the date option in though as I still think it's a good way to do things. My current kernel, 2.6.6, is "Elrond." The machine itself is "Smeagol."
Note Kernel compile help For non-Debian instructions see the Appendix "Appendix B". For more information on how to compile the kernel The Debian Way please read Creating custom kernels with Debian's kernel-package system
-----
12. Install the new kernel
I like to configure lilo on my own, but do whatever tickles your fancy.
* cd /usr/src * dpkg -i kernel-image-<version>.<date>-10.00.Custom-i386.deb At this point I decline all the lilo updates and configure it myself by hand. * configure lilo by hand: vi /etc/lilo.conf *&nbs
ere able to follow it, in some sense that might say something about the plausibility of such kindness in this universe.)
I have argued above that we cannot prevent the Singularity, that its coming is an inevitable consequence of the humans' natural competitiveness and the possibilities inherent in technology. And yet ... we are the initiators. Even the largest avalanche is triggered by small things. We have the freedom to establish initial conditions, make things happen in ways that are less inimical than others. Of course (as with starting avalanches), it may not be clear what the right guiding nudge really is:
Other Paths to the Singularity: Intelligence Amplification
When people speak of creating superhumanly intelligent beings, they are usually imagining an AI project. But as I noted at the beginning of this paper, there are other paths to superhumanity. Computer networks and human-computer interfaces seem more mundane than AI, and yet they could lead to the Singularity. I ca
which digital content can be replicated - publishers resortedto draconian copyright protection measures (euphemisticallyknown as "digital rights management"). This further alienatedthe few potential readers left. The opposite model of "viral"or "buzz" marketing (by encouraging the dissemination of freecopies of the promoted book) was only marginally moresuccessful.Moreover, e-publishing's delivery platform, the Internet, hasbeen transformed beyond recognition since March 2000.From an open, somewhat anarchic, web of networked computers -it has evolved into a territorial, commercial, corporateextension of "brick and mortar" giants, subject to governmentregulation. It is less friendly towards independent (small)publishers, the backbone of e-publishing. Increasingly, it isexpropriated by publishing and media behemoths. It is treatedas a medium for cross promotion, supply chain management, andcustomer relations management. It offers only some minorsynergies with non-cyberspa
Debian is free in this sense: You are free tomodify and redistribute it and will always have access to the source codefor this purpose. The Debian Free Software Guidelines describe in moredetail exactly what is meant by ``free.'' The Free Software Foundation,originator of the GNU Project, is another excellent source of information.You can find a more detailed discussion of free software on the Debian website. One of the most well-known works in this field is Richard M.Stallman's essay, Why Software Should Be Free; take a look at it for someinsight into why we support Free Software as we do. Recently, some peoplehave started calling Free Software ``Open Source Software''; the two termsare interchangable.
You may wonder why would people spend hours of their own time writingsoftware and carefully packaging it, only to give it all away. The answersare as varied as the people who contribute.
Many believe in sharing information and having the freedom to c
and diversity lets all kinds of innovative stuff happen: if you go to nytimes.com and "send a story to a friend," the NYT can convincingly spoof your return address on the email it sends to your friend, so that it appears that the email originated on your computer. Also: a spammer can harvest your email and use it as a fake return address on the spam he sends to your friend. Sysadmins have server processes that send them mail to secret pager-addresses when something goes wrong, and GPLed mailing-list software gets used by spammers and people running high-volume mailing lists alike.
You could stop spam by simplifying email: centralize functions like identity verification, limit the number of authorized mail agents and refuse service to unauthorized agents, even set up tollbooths where small sums of mo
frosted glass so the reader can peer intothat hazy world. `Underground' belongs on the Net, in their ephemerallandscape.
The critics have been good to `Underground', for which I am verygrateful. But the best praise came from two of the hackers detailed inthe book. Surprising praise, because while the text is free of thenarrative moralising that plague other works, the selection of materialis often very personal and evokes mixed sympathies. One of the hackers,Anthrax dropped by my office to say `Hi'. Out of the blue, he said witha note of amazement, `When I read those chapters, it was so real, as ifyou had been right there inside my head'. Not long after Par, half aworld away, and with a real tone of bewildered incredulity in his voicemade exactly the same observation. For a writer, it just doesn't get anybetter than that.
By releasing this book for free on the Net, I'm hoping more peoplewill not only enjoy the story of how the international computerunderground rose to power, but also make
length from the default of 100, which on an ADSL line could take as much as 10 seconds to empty with a 1500 byte mtu.
-----
3.5. Attempting to Throttle Inbound Traffic
By using the Intermediate Queuing Device (IMQ), we can run all incoming packets through a queue in the same way that we queue outbound packets. Packet priority is much simpler in this case. Since we can only (attempt to) control inbound TCP traffic, we'll put all non-TCP traffic in the 0x00 class, and all TCP traffic in the 0x01 class. We'll also place "small" TCP packets in the 0x00 class since these are most likely ACK packets for outbound data that has already been sent. We'll set up a standard FIFO queue on the 0x00 class, and we'll set up a Random Early Drop (RED) queue on the 0x01 class. RED is better than a FIFO (tail-drop) queue at controlling TCP because it will drop packets before the queue overflows in an attempt to slow down transfers that look like they're about to get out of control. We'll also rate-limit bot
gement to the veryvaluable Journals of Poggendorff and Schweigger. Lessexclusively national than their Gallic compeer, they present apicture of the actual progress of physical science throughoutEurope. Indeed, we have been often astonished to see with whatcelerity every thing, even moderately valuable in the scientificpublications of this country, finds its way into their pages.This ought to encourage our men of science. They have a largeraudience, and a wider sympathy than they are perhaps aware of;and however disheartening the general diffusion of smatterings ofa number of subjects, and the almost equally general indifferenceto profound knowledge in any, among their own countrymen, may be,they may rest assured that not a fact they may discover, nor agood experiment they may make, but is instantly repeated,verified, and commented upon, in Germany, and, we may add too, inItaly. We wish the obligation were mutual. Here, whole branchesof continental discovery are unstudied, and indeed almos
ave himself from cipherdom, find an affirmative position. His thousand and three affairs of gallantry, after becoming, at most, two immature intrigues leading to sordid and prolonged complications and humiliations, have been discarded altogether as unworthy of his philosophic dignity and compromising to his newly acknowledged position as the founder of a school. Instead of pretending to read Ovid he does actually read Schopenhaur and Nietzsche, studies Westermarck, and is concerned for the future of the race instead of for the freedom of his own instincts. Thus his profligacy and his dare-devil airs have gone the way of his sword and mandoline into the rag shop of anachronisms and superstitions. In fact, he is now more Hamlet than Don Juan; for though the lines put into the actor's mouth to indicate to the pit that Hamlet is a philosopher are for the most part mere harmonious platitude which, with a little debasement of the word-music, would be properer to Pecksniff, yet if you separate the real hero, inartic