DRM, cracks, and my buying habits

The iPod, WMA, and DRM get Scobleized. The point he makes is that having many players available to you is important because once you commit to buying media locked up via DRM, you are locked in to whatever platforms support the kind of DRM your content uses. The problem with that argument is that I…

Clueless critique of RSS

Wow, is this list of “Ten Reasons RSS is not ready for Primetime” clueless. He makes some fair points. But out of the ten, these are either simply false, irrelevant, or seriously debatable: 2, 4, 5, 8, 9, 10. I’m not going to rebut them one at a time, because I expect others to jump…

Vegetarians Take Note

Turns out plants are thinking too. So there’s only one non-sentient food product left on the planet: Right-wing Republican Ribs! Finger lickin’ good. (And if you happen to get Rush’s ribs, you’ll get a nice buzz from the residual oxycontin.) Seriously, this is neat stuff. It is further proof that cellular automata are a critical…

Image recognition to prevent casual forgery

This is so cool! That explains why there are all those silly yellow “20”‘s in the background of the new US 20 dollar bills. The political/social/freedom aspects of this story leave me totally irritated. But the technology involved is pretty nifty, and the fact that the authorities managed to get this integrated into software for…

Binary Clock

Jhango is throwing a party Friday night to Saturday morning to celebrate when Unix time rolls over from 230-1 to 230. Since I can’t be there in person, I made her a binary clock that runs under Win32. It was surprisingly easy. I had it working in under 2 hours. I’ve made a few Windows…

iTunes gripes

On the first day it was released, I installed iTunes for Windows. I figured something from Apple has a chance of dislodging WinAmp as my music player. They pay attention to important details, and except for the ongoing Quicktime debacle, make software most people seem to like. Using it to edit MP3 metadata has been…

Security in Bee Society

Biology is neat, and is making huge progress towards being able to explain human nature. Check out this article on security mechanisms in bee populations. Perhaps someday we’ll know how to overcome human nature. Will we choose to do so?

Google Can’t Spell, pt 2

It occured to me that if you were trying to remove the Connection header from in the middle of a char * buffer, the absolute fastest way to do it would be to use strstr() to get a pointer to it, then do a byte swap to change the token from “Connection” to “Cneonction”. If…