Skip to main content

Home/ Politically Minded/ Group items tagged Compute:

Rss Feed Group items tagged

Skeptical Debunker

ASUS Bamboo Laptops: Notebook Computing Made Greener |  crispgreen.com - 0 views

  •  
    ASUS has always been known for making some of the best gaming computers in the world. Now they can also be known for making some of the coolest: ASUS now has two notebooks that are built using bamboo - and selling for under $1,000. The ASUS U6V and U2E Bamboo Series Notebook computers use industrial-strength two-year-old Moso bamboo for virtually the entire casing of the product. "We spent the last couple of years perfecting and working with bamboo," said Jonney Shih, Chairmen of ASUSTeK Computer Incorporated. "It is trendy yet responsible." Pound-for-pound, bamboo also has a regeneration rate that is simply unmatched in nature. It has been known to grow two feet in just 24 hours and using less energy in to manufacture than those made out of metal alloys from refined petroleum.
Skeptical Debunker

Tax Bomber Stack Wanted Independent Contractor Status to Avoid Paying Taxes - 0 views

  • Stack was upset that §1706 did precisely what it was designed to do: Deprive him of the chance to exploit independent contractor status to avoid paying taxes through non-filing or through the understatement of income, overstatement of deductions, and avoidance of income tax withholding. In spite of the overwhelming advantages attendant to employee status, Joe Stack desperately wanted to be treated as an independent contractor for one simple reason: It would have made his tax protesting easier.4 Footnotes: ¹  We have met many taxpayers who worked as independent contractors for years without so much as a peep of protest until they realized, ex post facto, that it might have better for them to have been treated as employees. In our experience, workers tend to be content with their independent contractor status until one of the following happens: They get fired or quit They get hurt on the job They get sued for something they did while on the job They need a bank loan (and employment verification)  ²  If Stack had been an independent contractor and was subsequently “fired” by his principal, my hunch is it would have taken him less time to file a claim for unemployment compensation than it takes Apolo Ohno to finish short track. ³  Indeed, §1706 was included in TRA ‘86 because the CBO had estimated that the government was losing up to 30% of taxes because independent contractors were either not reporting all of their income on their tax returns or were claiming fraudulent or questionable deductions against that income. 4   Like all tax protestors, Stack knew that once the IRS had collected his taxes through payroll withholding it would never give it back to him based on previously refuted tax protestor arguments. Consequently, his only chance of avoiding taxes was to control his own tax payments and then use his frivolous arguments to evade or at least defer paying taxes.
  •  
    Enacted in 1978, §530 is a safe harbor law that lists several conditions which if met allows workers to be treated as independent contractors rather than employees.\n\n Joe Stack was compelled to burn his house down, murder his wife and children and fly his airplane into the side of a federal building because 24 years ago Congress passed and President Reagan signed into law the Tax Reform Act of 1986 that added sub-section (d) to §530 thereby excluding engineers and computer programmers from the safe harbor provisions of §530 .\n\nThe passage of this law (§1706 of the Tax Reform Act of 1986) did not as some have suggested make all engineers and computer programmers employees, it merely made them subject to the 20 factor common law test historically used for determination of a worker's status. In other words, had Joe Stack been truly independent from the company or companies to whom he provided services, he could have, should have and would have been treated as an independent contractor rather than an employee.
Skeptical Debunker

Unintended Consequences: Twelve Years under the DMCA | Electronic Frontier Foundation - 0 views

  • The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten's team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public's fair use rights. Already, the movie industry's use of encryption on DVDs has curtailed consumers' ability to make legitimate, personal-use copies of movies they have purchased. The DMCA Impedes Competition and Innovation. Rather than focusing on pirates, some have wielded the DMCA to hinder legitimate competitors. For example, the DMCA has been used to block aftermarket competition in laser printer toner cartridges, garage door openers, and computer maintenance services. Similarly, Apple has used the DMCA to tie its iPhone and iPod devices to Apple's own software and services. The DMCA Interferes with Computer Intrusion Laws. Further, the DMCA has been misused as a general-purpose prohibition on computer network access, a task for which it was not designed and to which it is ill-suited. For example, a disgruntled employer used the DMCA against a former contractor for simply connecting to the company's computer system through a virtual private network ("VPN").
  •  
    Since they were enacted in 1998, the "anti-circumvention" provisions of the Digital Millennium Copyright Act ("DMCA"), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the "black box" devices intended for that purpose.1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities:
thinkahol *

America's Secret Empire of Drone Bases - 0 views

  •  
    They increasingly dot the planet.  There's a facility outside Las Vegas where "pilots" work in climate-controlled trailers, another at a dusty camp in Africa formerly used by the French Foreign Legion, a third at a big air base in Afghanistan where Air Force personnel sit in front of multiple computer screens, and a fourth at an air base in the United Arab Emirates that almost no one talks about. And that leaves at least 56 more such facilities to mention in an expanding American empire of unmanned drone bases being set up worldwide.  Despite frequent news reports on the drone assassination campaign launched in support of America's ever-widening undeclared wars and a spate of stories on drone bases in Africa and the Middle East, most of these facilities have remained unnoted, uncounted, and remarkably anonymous - until now. Run by the military, the Central Intelligence Agency, and their proxies, these bases - some little more than desolate airstrips, others sophisticated command and control centers filled with computer screens and high-tech electronic equipment - are the backbone of a new American robotic way of war.  They are also the latest development in a long-evolving saga of American power projection abroad - in this case, remote-controlled strikes anywhere on the planet with a minimal foreign "footprint" and little accountability.Using military documents, press accounts, and other open source information, an in-depth analysis by TomDispatch has identified at least 60 bases integral to U.S. military and CIA drone operations.  There may, however, be more, since a cloak of secrecy about drone warfare leaves the full size and scope of these bases distinctly in the shadows.
thinkahol *

Lesser-Evil Math Doesn't Compute: Freedom Plaza Has the Same Name as Tahrir Square | Tr... - 0 views

  •  
    In an electoral system corrupted by money, media, and parties, the US people are offered a choice every four years between two hideously awful candidates for an office that increasingly resembles an imperial throne. And increasingly the primary motivation of voters is to oppose the candidate they believe is the greater evil.
Skeptical Debunker

Prudential-AIG Deal Another Case of Corporate Empire Building - 0 views

  • In spite of its new whizz-bang CEO, Prudential is a slow-moving but very reliable organization with a level of integrity that is trusted by policyholders. Frankly, that's what you want in an insurance company. I have had a modest U.K. pension with one of its competitors since 1980, and I am constantly worried that some leveraged buyout (LBO) artist will step in, take it over, change the computer system so that information gets lost, outsource customer service, and drive the company into bankruptcy. If you're buying life insurance or pension services, you want a company that's not going to disappear in the next 30 years, and doesn't change its address or computer system too often. Avoid a company like the plague if it is run by whiz kids. However, that's what AIG was like. We know how AIG operated; a guy who thought betting the ranch on the credit default swap market was a good idea ran it. Its Asian operation is no doubt full of similarly clever ideas. Even in the unlikely event that everything there is on the level, the cultural clash with an old-fashioned British insurance company is huge. And why would you pay a PREMIUM for an AIG operation? Like the Kraft/Cadbury deal, Prudential's takeover of AIA is value-destroying. Also like Kraft/Cadbury, it looks likely to destroy a valuable part of the British economy that millions of people have relied upon for generations - only this time the destruction will be caused by the buyer rather than the target. As shareholders we need a new form of corporate governance. Those in management are hired hands. In the old days, large shareholders used to treat management as they would have treated their butler - and management was equally deferential to the owners of substantial percentages of the company's capital. That's how capitalism is supposed to work - with resources deployed in the interests of the owners of capital. We know that system works; economics shows us why it works. The alternative, with resources deployed to satisfy the egos and fill the pockets of the hired hands, has no theoretical justification and little practicality - just as a big country house run in the interests of the butler would be a mess. As capitalists, we must work together to restore capitalism!
  •  
    To inattentive observers, the recent announcement that the British insurance company Prudential PLC (NYSE ADR: PUK) would pay $35.5 billion for American International Group Inc.'s (NYSE: AIG) Asian insurance operation, AIA, might seem like just another belated expansion of the old British Empire - a strange contrast to the sale of the premier British chocolate company Cadbury PLC (NYSE ADR: CBY) to Kraft Foods Inc. (NYSE: KFT) last month. Yet in reality both deals are examples of Empire-building that for shareholders is much more dangerous than the benign British variety - Empire-building by corporate management that runs contrary to capitalist ideals.
  •  
    Monopolies - BAD (Adam Smith even said so!) Companies controlled and run by management (as if it were their own personal fiefdom and with their hands always in the "cookie jar"), rather than shareholders - BAD. BOTH ANTI-CAPITALISTIC. Both the "norm" for "the titans" of "modern [anti] capitalism". We no longer have capitalism (if that, like communism, ever existed in a more or less "pure" form!). We have a kleptocracy of the rich and corporate aristocracy (as incestuously intertwined as the European nobles ever were!).
thinkahol *

Politics and eye movement: Liberals focus their attention on 'gaze cues' much different... - 0 views

  •  
    In a new study, researchers measured both liberals' and conservatives' reaction to "gaze cues" -- a person's tendency to shift attention in a direction consistent with another person's eye movements. Liberals responded strongly to the prompts, consistently moving their attention in the direction suggested to them by a face on a computer screen. Conservatives, on the other hand, did not
thinkahol *

The Blog : How Rich is Too Rich? : Sam Harris - 0 views

  •  
    I've written before about the crisis of inequality in the United States and about the quasi-religious abhorrence of "wealth redistribution" that causes many Americans to oppose tax increases, even on the ultra rich. The conviction that taxation is intrinsically evil has achieved a sadomasochistic fervor in conservative circles-producing the Tea Party, their Republican zombies, and increasingly terrifying failures of governance. Happily, not all billionaires are content to hoard their money in silence. Earlier this week, Warren Buffett published an op-ed in the New York Times in which he criticized our current approach to raising revenue. As he has lamented many times before, he is taxed at a lower rate than his secretary is. Many conservatives pretend not to find this embarrassing. Conservatives view taxation as a species of theft-and to raise taxes, on anyone for any reason, is simply to steal more. Conservatives also believe that people become rich by creating value for others. Once rich, they cannot help but create more value by investing their wealth and spawning new jobs in the process. We should not punish our best and brightest for their success, and stealing their money is a form of punishment. Of course, this is just an economic cartoon. We don't have perfectly efficient markets, and many wealthy people don't create much in the way of value for others. In fact, as our recent financial crisis has shown, it is possible for a few people to become extraordinarily rich by wrecking the global economy. Nevertheless, the basic argument often holds: Many people have amassed fortunes because they (or their parent's, parent's, parents) created value. Steve Jobs resurrected Apple Computer and has since produced one gorgeous product after another. It isn't an accident that millions of us are happy to give him our money. But even in the ideal case, where obvious value has been created, how much wealth can one person be allowed to keep? A trillion doll
thinkahol *

Tomgram: Engelhardt, The Pentagon's Fake Jihadists | TomDispatch - 0 views

  •  
    "Or consider what American computer specialists are doing on the Internet, perhaps terrorist leaders' greatest safe haven, where they recruit, raise money, and plot future attacks on a global scale. American specialists have become especially proficient at forging the onscreen cyber-trademarks used by Al Qaeda to certify its Web statements, and are posting confusing and contradictory orders, some so virulent that young Muslims dabbling in jihadist philosophy, but on the fence about it, might be driven away."
The Ravine / Joseph Dunphy

The MTTLR Blog: Taking Down a Bully, But Taking the Computer Fraud and Abuse Act Too Far? - 0 views

  •  
    Criticism of the decision in the Lori Drew case.
S D

Text Messaging for Political Candidates - 4 views

  •  
    With the rise of cell phone usage, candidates across the country are starting to use mobile texting as an effective campaign tool. As mobile computing blurs the line between online and offline campaigning, we are going to see more use of crossover technologies by political campaigns.
Skeptical Debunker

We're so good at medical studies that most of them are wrong - 0 views

  • Statistical validation of results, as Shaffer described it, simply involves testing the null hypothesis: that the pattern you detect in your data occurs at random. If you can reject the null hypothesis—and science and medicine have settled on rejecting it when there's only a five percent or less chance that it occurred at random—then you accept that your actual finding is significant. The problem now is that we're rapidly expanding our ability to do tests. Various speakers pointed to data sources as diverse as gene expression chips and the Sloan Digital Sky Survey, which provide tens of thousands of individual data points to analyze. At the same time, the growth of computing power has meant that we can ask many questions of these large data sets at once, and each one of these tests increases the prospects than an error will occur in a study; as Shaffer put it, "every decision increases your error prospects." She pointed out that dividing data into subgroups, which can often identify susceptible subpopulations, is also a decision, and increases the chances of a spurious error. Smaller populations are also more prone to random associations. In the end, Young noted, by the time you reach 61 tests, there's a 95 percent chance that you'll get a significant result at random. And, let's face it—researchers want to see a significant result, so there's a strong, unintentional bias towards trying different tests until something pops out. Young went on to describe a study, published in JAMA, that was a multiple testing train wreck: exposures to 275 chemicals were considered, 32 health outcomes were tracked, and 10 demographic variables were used as controls. That was about 8,800 different tests, and as many as 9 million ways of looking at the data once the demographics were considered.
  •  
    It's possible to get the mental equivalent of whiplash from the latest medical findings, as risk factors are identified one year and exonerated the next. According to a panel at the American Association for the Advancement of Science, this isn't a failure of medical research; it's a failure of statistics, and one that is becoming more common in fields ranging from genomics to astronomy. The problem is that our statistical tools for evaluating the probability of error haven't kept pace with our own successes, in the form of our ability to obtain massive data sets and perform multiple tests on them. Even given a low tolerance for error, the sheer number of tests performed ensures that some of them will produce erroneous results at random.
1 - 13 of 13
Showing 20 items per page