October 1998

Archive of Unquotidian Quotes. Join by sending email to Karthikeyan at kandr@giasmd01.vsnl.net.in



UQ: overlapping windows and LISA

30 Oct 1998

During the time of inventing the Lisa - around 1983, doing overlapped
windows for graphic terminals was not yet understood. Bill Atkinson of
Apple was assigned to work on the graphics component of the Lisa. The
phenomenon of overlapping windows was a big problem. The basic problem was
this:

When you opened a window, resized a window or moved one, what happened
underneath? Did the computer have to perform all thw rok of drawing the
windows you did not see, or was there a way that it could save energy (
computation time) by drawing only the part of the display the viewer saw
at a given moment?

Atkinson noticed this problem first on the Alto which was a computer which
a GUI developed at PARC. Steve Jobs and company were inspired to make the
macintosh after looking at this. Atkinson wanted to develop a system
whereby these regions would be redrawn such the user would not notice that
everything was being redrawn.

He wokred at the problem for months - not only in long hours at a desk,
but literally in his dreams. Upon arising he would record his somnambulant
labors in a notebook. Eventually wave after wave of his brainpower eroded
the problem. He had set out to reinvent the wheel, and ended up inventing
it. The solution he developed dealt with a sophisticated use of algebra to
calculate which "regions" of the window had to be drawn and remembered.
This technology is standard in todays software and hardware accelerated
video cards.

For a time, Atkinson was the only person in the world who understood the
voodoo by which these regions could so quickle display overlapping
windows. This was almost disastrous. One day while driving to work, he
failed to notice a tractor-trailer ahead of him and drove his sports car
underneath it and it sheared off the top of the car. He wound up rather
dysfunctional in hospital and remained there for a breif period. When he
awoke in the hospital room, Steve Jobs was staring at him with concern,
"Dont worry Steve, " he said. "I still know how to do regions."

Source: Insanely Great - Stephen Levy, published by Penguin Books.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: spam from Cornell University!!!

29 Oct 1998

I had applied for an application from Cornel University by mailing them
the filled in electronic pre-application form. I got the application
packet from them around 2 months back.

2 days back I suddenly got the following email from them with a subject
line saying RE: Request for application form, and my mail included at the
end!!!

They actually maintain a database of people requesting application and
send out advertisements to them!!! Can they be sued for spamming :-)

--- begin

Date: Tue, 27 Oct 1998 10:56:48 -0500
From: Cornell CS Grad Office 
To: 'Karthikeyan' 
Subject: RE: Request for application form 

Thank you for your interest in Graduate Programs in Computer Science at
Cornell University. We have recently put our new Annual Report of
Research and Education on line. If you have access to the World Wide
Web, you may visit the new site at
http://www.cs.cornell.edu/annual_report/1997/Default.htm
Thank you again for your interest.


-----Original Message-----
From: Karthikeyan [mailto:kandr@giasmd01.vsnl.net.in]
Sent: Wednesday, July 08, 1998 1:19 AM
To: Cornell CS Grad Office
Subject: RE: Request for application form 


Dear Sir,

I have enclosed with this mail the pre application form. 

-- Karthikeyan


UQ: Pentium becomes and embedded processor

28 Oct 1998

Silently the powerful pentium processor that you find inside your desktop
has been relegated to an embedded processor - what is worse is that as an
embedded processor it is no good!!! You may soon find microwave ovens and
washing machines using a pentium to control their operation. 

The article below is an extract from an embedded processor mailing list:

---

Now that the chip has outlived its usefulness in the notebook PC market, 
Intel's Pentium/MMX is now officially an embedded microprocessor. The 
company has shifted responsibility for the chip from its mainstream 
desktop PC group to its embedded division in Chandler (Arizona), lowered 
prices, and extended the production life of the part by several years.

The Pentium/MMX (called the "Low Power Pentium Processor with MMX 
Technology" in Intel parlance) is the same chip that powered laptop PCs 
not so long ago. As such, it has a 64-bit bus, full FPU, dual 16K 
caches, and the famous x86 software compatibility. The chip is offered 
in 166-MHz and 266-MHz speed grades and two packages, including a new, 
low-profile BGA package.

The use of the term "low power" is somewhat optimistic; the chip 
typically dissipates 2.9 W at 166 MHz and 5.3 W at 266 MHz, according to 
Intel. In 1,000-unit quantities, the Pentium/MMX sells for $51 (166 MHz) 
or $104 (266 MHz), a bit below its former PC prices. At these prices, 
the Pentium/MMX is a relatively good value. Although there are many RISC 
processors that provide superior price/performance, none of them can 
compete with the wealth of software, development tools, and 
infrastructure that the Pentium brings with it. 

Embedded Processor Watch

(c) 1998 MicroDesign Resources


---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Perl RULEZ!!!

27 Oct 1998

The statistics below are from a site on the web which uses Altavista and
searches for a few languages, followed by either "sucks" or "rules." It
computes the rule-to-suck ratio (higher is better) and plots the
result every hour as a graph. The funda being that the popularity of a
language is gauged by not how many people use it but how many people like
it.
http://www.tpj.com/tpj/rules

A similar process is done for Operating Sytems also. Actually the
languages page is inspired by this page for OS.
http://electriclichen.com/linux/srom.html

Programming language rules/suck ratio:

Java : 1.0
VB   : 1.3
Tcl  : 2.8
Lisp : 9.0
Perl : 11.3

OS stats:
         Sucks    Rules
BeOS       1       10
FreeBSD    3       75
Linux    156      829
Mac OS    36      378
NetBSD     0       73
OS/2      40       60
Solaris   38       23
Unix     156      197
VMS       17       22
Windows 1299      138

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: VT100 optimizations in lynx

26 Oct 1998

The following text is an extract from the documentation that I wrote for a
shareware software - Cyclone a comm. program that I and ranga wrote around
2 years back. The text explains some weird VT100 optimizations done by
lynx.


You can download the program at
http://www.cdrom.com/simtelnet/msdos/commprog/cyclone.zip
It is one of the best comm programs and smallest.


The language and style of text is very different from my current writing
style. The text is reproduced verbatim from the FAQ of the documentation. 

---

The log file is most of the time a mess?

Don't blame me for this! We have seen this problem only with Lynx.
Lynx is a high funda web browser which does out of the world optimizations!
The junk in your log file is a result of this.

For example. Suppose you visit http://www.ddj.com/.  Then Lynx prints,

   Looking up www.ddj.com.

Then it prints,

   Getting http://www.ddj.com

It will send "Gett" then send 4 VT100 escape sequences to move the cursor
to the right, since already the "ing " from "Looking" is in the right place
(!!!!)

Wow! What optimization! The VT100 sequence for moving the cursor to the
right is "Esc [ B" -- 3 characters. So it sends 3 characters instead of
just sending the (one) character to be printed!!! So in this case it sent
3*4 = 12 characters instead of just 4 characters. I found this out only
while I was writing Cyclone. I guess on a true VT100 terminal (not our
computers with accelerated VGA display cards), printing a character is a
very slow process. So I think Lynx does these optimizations.

Such eccentric behaviour is followed at many places. So your log file is
most of the time made snazzy with half-words etc.

To overcome this we thought we would have an option to generate
a dump file with the VT100 sequences and then write a file viewer which
recognises VT100 sequence and then allow the user to cut out the text from
here, but then we thought not many would go to such lengths to get
info!! If you are interested in this option send us e-mail and we
will try to send you a version with this option.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Dalai Lama - sedition charges against India

25 Oct 1998

This is taken from an article that appeared in the IE October 22.
Surprisinly it was hidden in one of the inside pages and I guess most you
would have missed it.

There is a case pending in the Delhi court regarding sedition charges
against the Dalai Lama. A Delhi court has issued a "show cause" notice to
the CBI on a complaint against the Dalai Lama and six others for
"consipiring" to dismember Sikkim from India and alighing it with the
Tibetan autonomous region of China. The Delhi Chief Metropolitan
Magistrate had directed the CBI to file a formal reply on the matter by
October 26 after the CBI submitted that a Special Leave Petition was
pending in the Supreme Court.

All this controversy arose over the head of the Rumtek monastery. It is 24
km from Gantok and is the headquarters of the Kaghypa sect of Tibetan
Buddhism. The 16th Gyala Karmapa had established the Drama Chakra Center
at Rumtek in 1959, after China overan Tibet.

The monastery was built in 1730 by the ninth Karmapa. It was destroyed in
a fire and was rebuilt in its current site. Since the death of the 16th
Gyala Karmapa in 1981, the monastery has been without a head. It is
considered the richest monastery in India and one of the richest in the
world.

The case against the Dalai Lama was filed by one Naryan Sing, a member of
the monastery. He has accused the 

* Dalai Lama
* Former Sikkim Chief Minister Nar Bahadur Bhandari
* Tai Situ - a controversial Buddhist monk and formerly reagent at Rumtek
* and 4 others of consipiring to "dismember" Sikkim from India.

He alleged that the seven named in the complaint were misusing religion
for subversive Chinese propoganda and urged the court to summon the
"confidential" report prepared by the then Sikkim Chief Secretary K S Rao
in May 1997 to expose the consipracy and role of the Dalai Lama and other
monks.

In a totally unrelated incident, China has protested to India, becuase PM
Vajpayee had a meeting with the Dalai Lama in New Delhi a week back.

If our foreign policy is good, should we not highlight this court case to
China and tell them how actively we oppose the Dalai Lama and support
China's foreign policy. India currently does not have an External Affairs
Minister and it is regretable that we dont know how to play the diplomacy
game.  Even though India strongly supports Tibetan cause, it will
definitely be very rewarding for India if we can tell the Chinese that not
only does the Dalai Lama want to break China (autonomy for Tibet), he
wants to break India too and tell China that we should jointly counter
this menace for subverting religion and sponsoring terrorism. 

---------- U N Q U O T I D I A N    Q U O T E S ---------- 
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Anuhav finance foresight

24 Oct 1998

Some of you may vaguely remember seing advertisements of the Anubhav group
around one and half to two years ago. They used to appear very frequently
during cricket matches.

One Ad, I remember was for Anubhav teak plantations: in the end an old man
lifts his grand-daughter above his shoulders and dances in the rain.

When I first saw these ads my brother and I were convinced that this was a
money laundering scheme or fraud of some sort. Anubhav started off as a
conglomerate! Suddenly as a startup, they offered Teak plantation, Tea
plantation, Finance, and Insurance. It is financially impossible for any
startup to do this. Their interest rates and schemes also seemed too good.

Our opinion seems to have been proved right. IE dated October 23rd,
carried a news item that said that the Anubhav Finance offices were closed
for 3 days consecutively and even the watchman was missing. Former Deputy
Finance Minister Magan Bhai Barot is one of the depositors (25 lakhs).
Depositors turned up in large numbers at the Anubhav Center, T.Nagar,
Chennai seeking refund of their deposits. Even Barot was not able to
establish contact with the company executives.

Yesterday police had to disperse the mob, becuase they became belligerent.
The depositors were instructed to go to the Police Commisioner and file a
complaint with the dept. dealing with finance company frauds. Barot was
seen advising the depositors about the next course of action and he
requested them to come together and fight against the company.

The Anubhav MD has claimed in a statement that the company's assets are
worth Rs 189 crores and that the liabilities to the depositors is only Rs
28 crore and that assets will be liquidated and depositors repaid. 

All this was in yesterdays IE. The MD surrendered to Crime Branch at the
city Police Commissioner's office on October 23rd.

So if you planing to invest your money, look at the UQ rating of that
company first :-)

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: cache optimizations

23 Oct 1998


Source: This article was taken from BEinfo newsletter
()  and rewritten by me in a more
lucid (command man understandable) manner with some original inputs about
virtual memory. 

Todays CPU use exotic cache system with an inside the chip cache and an L2
cache. The CPU first looks for the data in the on board cache and then
looks at the L2 cache. If there is a miss on both it goes and looks in the
memory. The memory is written to the cache in blocks and these blocks are
typically 32 bytes long. The reason is that code that we write is
spatially localised ie if we access data/instruction at memory location I,
it is very likely we will need I+1 shortly.

Different CPU use different method to handle cache miss and this becomes a
very important issue while doing code optimization for speed as the
example below shows.

The example program is the primitive implementation of the2 classic
Erastosthenes Sieve algorithm for searches of prime numbers. 

The main loop is terse:

for(i=2; i<=sqrt_max; i++) /* don't search all numbers */
  {
    if(!list[i])   /* i is a prime number */
      {
        /* mark as non-prime all multiples of i */
        for(j=i+i; j<=nmax; j+=i)
          list[j] = 1;
      }
  }

As you see, the code is very straightforward but it runs faster on a
Pentium 166 than on a Pentium II 300 MHz! Here's the full text of the test
program: 

Consider another function seive2

/* the same but without unnecessary memory writes */
void sieve2(unsigned char* list, int nmax)
{
  int i,j;
  int sqrt_max;

  sqrt_max =  (int)(sqrt(nmax)+0.5);

  for(i=2; i<=sqrt_max; i++)
  {
    if(!list[i])
    {
     for(j=i+i; j<=nmax; j+=i)
        if(!list[j])     /* it's not already marked */
          list[j] = 1;   /* mark it */
    }
  }
}

The results with gcc -O3 and Metrowerks cc -O3 (smaller
numbers are better) in seconds are
2
            Pentium 166       PentiumII 300
sieve1         1.97              2.75
sieve2         3.83              1.76

On the sieve1 function, the Pentium 166 is much faster than the Pentium II
300. The reason for this is the implementation of the write cache. 

Pentium Pro and Pentium II processors have a "write allocate by
read-for-ownership" cache, whereas the Pentium processor has a
"no-write-allocate; write through on write miss"  cache. Both have a 32
byte cache.

What this means is that when a cache miss occurs when writing the entire
page/block in the cache for that memory location is written back to the
memory. The advantages are that:

This will be a burst write and the DRAM bits will be updated in parallel
and time taken to write will be very less compared to time taken to write
each byte seperately.

On the Pentium processor, when the same write miss occurs, the write is
simply sent out to memory. That byte alone is update in the memory. The
processor will update the value in the cache and simultaneously write it
to the memory also at once.

However, write allocate can be a disadvantage in code where:

* Just one piece of a cache line is written, ie there is not much spatial
  localisation in your code.
* Writes are made to a large number of addresses.

When a large number of writes occur within an application, as in the
sieve1 function, and the memory elements are farther away than the 32 byte
blocks, we have a very bad situation on the Pentium II. Because of a lot
of memory accesses the cache will become full, resulting in a lot of cache
misses. In this application we are writing, which adds to our problem. 
Write misses are worse compared to read misses.  On a Pentium Pro or
Pentium II processor each of these writes will cause an entire cache line
(32 bytes) to be written. There is a very subtly point here, the writes
are batched and each block is not rewritten to memory for every cache
miss. Such a write will be forced because in a short time because, we
require a lot of memory and are writing every element of the array.

Sieve2 checks the value prior to writing, and thus reduces the number of
writes of dirty cache lines to memory. 

So when you write time optimized code think about cache behavior. Infact
the current thinking is that code optimization should take into account
how the virtual memory is organized. I read an article about this in a
recent (later August) issue of IEEE Computer. They had looked at different
virtual memory organizations and how different programs were affected
because of this. 

This article illustrates only one specific speed trap -- there are many
more.  For a better understanding of how interactions between hardware and
software affect performance, I recommend the excellent textbook "Computer
Architecture: A Quantitative Approach,"  by David Patterson and John
Hennesy, ISBN 1-55860-329-8.  Specific recommendations for Intel CPUs are
in the "Intel Architecture Optimizations Manual,"
, which
was used as a reference for this article.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: spoken and written chinese

22 Oct 1998

Chinese is not, in fact, a single language. It's about five major
languages, any of which are mutually unintelligible. And yet, you can
write Chinese in one language and read it in another. Now that's what I
call a portable language. By choosing a higher level of abstraction, the
Chinese writing system optimizes for communication rather than for
simplicity. We have a billion people in China who can't all talk to each
other, but at least they can pass notes to each other.

Ranga's personal verification: I have clarified from a chinese student
here that this was the case in the past. After the communists came to
power, a common Chinese was imposed on everyone. This is the Mandarin
Chinese spoken in the Beijing area. Not coincidentally, Beijing was the
capital and Mandarin was the dialect spoken by the kings. Now Chinese are
taught in Mandarin in school. 

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: IEEE Copyright policy for publication

21 Oct 1998

This is extracted from the IEEE Copyright form that is sent to authors who
want their work published in IEEE Journals and Conferences. This
particular form is specific to HiPC98. I have edited some unnecessary
stuff. I hope this copyright form itself is not covered under some
copyright, that would land me in trouble :-)

Read with care.

--- begin

IEEE COPYRIGHT FORM        (HiPC'98)
     
The IEEE has developed this form with great care and with the best 
interests of its members and contributing authors in mind. Therefore, 
in order to maintain uniform treatment among all contributors, Company 
or other forms may not be substituted for this form, nor may any 
wording of this form be changed. This form is intended for original, 
previously unpublished material submitted to IEEE periodicals and 
conference publications. This form, when completed, must accompany any 
such material in order to be published by the IEEE. Please read it 
carefully and keep a copy of it for your files.
     
PART A - COPYRIGHT TRANSFER FORM
(U.S. Government employees whose work is not subject to U.S. copyright 
should so certify by signing Part B overleaf. Authors of works subject 
to Crown Copyright should sign Part C overleaf.)
     
The undersigned hereby assigns all copyright rights in and to the 
above work to The Institute of Electrical and Electronics Engineers, 
Inc. (the "IEEE"). 

*note the above para* assigns all copyright to IEEE!!!!!

The undersigned hereby represents and warrants that 
the work is original and that he/she is the author of the work, except 
possibly for material such as text passages, figures, and data that 
clearly identify the original source, with permission notices from the 
copyright owners where required. The undersigned represents that 
he/she has the power and authority to make and execute this 
assignment.
     
In return for these rights, the IEEE recognizes the retained rights

*note above line* in return for giving these rights, IEEE allows you to
say that the work is yours.
 
noted in items 1 and 4 below, and grants to the above authors and 
employers for whom the work may have been performed a royalty-free 
license to use the material as noted in items 2 and 3. Item 5 
stipulates that authors and employers must seek permission to 
republish in cases not covered by Items 2, 3, and 4.
     
1. Employers (or authors) retain all proprietary rights in any 
process, procedure, or article of manufacture described in the work.
    
2. Authors/employers may reproduce or authorize others to reproduce 
the above work, material extracted verbatim from the above work, or 
derivative works for the author's personal use or for company use 
provided that the source and the IEEE copyright notice are indicated, 
that the copies are not used in any way that implies IEEE endorsement 
of a product or service of an employer, and that the copies themselves 
are not offered for sale. (See "Author/Employer Rights" overleaf.)
     
3. Authors/employers may make limited distribution of all or portions 
of the above work prior to publication if they inform the IEEE of the 
nature and extent of such limited distribution prior thereto.
     
4. In the case of work performed under a U.S. Government contract or 
grant, IEEE recognizes that the U.S. Government has royalty-free 
permission to reproduce all or portions of the above work, and to 
authorize others to do so, for official U.S. Government purposes only, 
if the contract/grant so requires. (Appropriate documentation may be 
attached, but IEEE's Copyright Form MUST BE SIGNED. See "U.S. 
Government Employees/U.S. Government Contract Work" overleaf.)
     
5. For all circumstances not covered by Items 2, 3, and 4, 
authors/employers must request permission from the IEEE Copyrights 
Office to reproduce or authorize the reproduction of the work or 
material extracted verbatim from the work, including figures and 
tables. Please see notes on "IEEE Obligations" as copyright holder.
     
In the event the above work is not accepted and published by the IEEE 
or is withdrawn by the author(s) before acceptance by the IEEE, this 
agreement becomes null and void.

PS: Infact for publishing your work in some IEEE Journals you have to pay
them some a fixed fee for each page of your paper!!!

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Dedicated people still in Govt. service

20 Oct 1998

After a set of dark brooding postings here's something to give us a
cheer. 

This is a letter that I read in a local weekly newspaper called Metro Ads.

I applied for a new Family Ration card in response to the news item
appeared in the dailies in Feb 1997 to the Asst. Commisioner Civil
Supplies, Ambattur. An acknowledgement was issued to me and verification
bu staff of Civil supplies dept was done in mid 1997. Thereafter when new
cards were issued in May 98, I made innumerable visit to the ration shops
but my card was not available. 

I then visited the office of the Asst. Comm. of Civil Supplies and
explained my problem to the staff. They said that they probably misplaced
some of my material and asked me to apply again for a new card. Even after
3 months of applying for the new card, I got no news from them. I then
contacted the Asst. Comm. over phone (during mid aug) and told him my
problem personally.  He was very sympathetic and promised to take
necessary action in the matter to ensure that a family ration card is
issued to me. I was pleasantly surprised when the Asst. comm. personally
visited my residense late in the evening on 6.10.98 and handed over my new
family ration card. 

---

A very rare dedicated person in government service. May their numbers
increase.

PS 
 

I saw and ad for Arun ice creams on TV. A lift opens with a female and a
fat guy alone inside the lift. Then a guy with ice creams goes in and he
takes the female and the fat guy takes the ice creams.

The important funda is that when the lift opens with the female and the
fat guy. He is standing with a *cigar*. Anybody remember Bill and Monica.



---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Plastic reuse

19 Oct 1998

There is a company called Rhinotek - Omni products which is extremely
conscious of plastic reuse. They make laser printer toner cartridges which
are made of plastic. They have such a strong sense of protecting the
environment from plastic that they recycle this. Read the extract below
from their web site. 

          At Omni, we are doing everything possible to encourage people
          to recycle toner cartridges. Every year millions of empty toner
          cartridges are tossed into the landfills and garbage dumps of
          America and quite frankly... we don't want any of them to be
          RHINOS.

          That's why we make it easy for you to return your empty
          RHINOTEK Cartridges to us.

          We pay the freight to help you to send our RHINOS back to
          where they came from.

          We provide a self-sealing box and pay the freight by
          enclosing a pre-paid shipping label in every RHINOTEK carton.
          Just put your empty RHINO back in the box, slap the label on
          the outside, and send the box back to us.

You can contact rhinotek at 1-800-695-7446 or www.rhinotek.com

They also do they bit to save their namesake the real rhino.

Today only 5700 rhinos roam the earth, down from 500,000 ten years
ago. Rhinotek shares some of its profits every year with LEWA Wildlife
Conservancy run by a non-proft organization. LEWA is a 55,000 acre
preserve in Northern Kenya that is entirely fenced and constantly guarded
by well armed and specially trained anti-poaching patrols.

So if you are buying laser printer toner cartridge please buy rhinkotek
and help save the rhino. If your lab has a laser printer pass on this info
to the person incharge of buying the cartridges.

PS: Continuing with the Salman Khan saga.

He was released from jail 2 days back and has still not issued a statement
of regret and has said various other things like "I found the jails very
bad... It disturbs me... There were 70 year old people there... The food
was bad...I am thrilled that my fans supported me during my ordeal..."

"I have learnt from this experience and am anxious to get back to work. I 
have faith in the law." (and many more banalities). The only thing he did
not say was "It is a political conspiracy".

Let us start a campaign to give the death sentence to such ignorant, head
strong people. I have come to believe that bollywood is full of TOTALLY
BRAINLESS people. Inspite of consul from his lawyer, 3 days in jail, if a
person does not realise that killing wild animals entails a 7 year
sentence in India and talks as if in anger he twisted another person's arm
and broke it, it goes to show the total absence of a brain in the brain
cavity. Or he has already bribed enough people that no FIR is going to be
registered. I believ this is the case.

The same behaviour is exhibited by Bollywood's news cousin, STAR news
covering this story more for star value (salman khan) than as a poaching
issue. The Jodhpur correspondent covered his release and as all other news
reports wanting to end his story with a punch line says, "With his 3 year
stay in jail over, he is released now. But with the legal wrangling over
this case, he is not out of the wood just yet." It was as if
everybody thinks these 3 days in remand is his punishment and he does not
have to serve any sentence.

More than all these educated people, it is common man who is using his
brain or rather has a brain. In Rajasthan the bishnoiyan community has
started a campaign to remove all of Salman Khan's films from being
screened and they are already off in Jodhpur.

PSS: The bishnoiyan community is not the average caste community like the
Jats, vaishyas pressing for personal caste gains. One of the bishnoiyan
woman clung onto a tree to prevent its cutting; they worship the forests
and are easily incensed when the forests are harmed.

I am willing to bet anything that Salman Khan will not spend another day
in jail with regard to this case; what with the amount of money Khan has
and the number of brainless judges, policemen abounding in India.

I will not be surprised if the case is dismissed outright because of lack
of prima facie evidence (they will not be able to find the gun which
killed the deer, no blood anywhere etc) against the accused. 

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Japanese leprosy, eugenics program

18 Oct 1998


This is an extract from The News-Times - A Japanese paper, December 19,
1997. 

This is a very disturbing story and is an example of how wrong the world has become.

---

   Victims begin to talk about Japan's sterilization program
  
   By MARI YAMAGUCHI
   
   Associated Press Writer
   
   HIGASHIMURAYAMA, Japan (AP) - Just weeks before his wedding 47 years
   ago, Yasuji Hirasawa was given an ultimatum - be sterilized, or the
   wedding would be stopped.
   
   When a nurse broke the news, Hirasawa felt he had no choice. He was a
   victim of Hansen's Disease - leprosy - and he had grown accustomed to
   accepting official limits on his freedom.
     _________________________________________________________________
   
   Yasuji Hirasawa, a victim of Hansen's Disease, speaks during an
   interview with the Associated Press Friday, Dec. 5, 1997, at an
   isolated leper colony in Higashimurayama, outside Tokyo. Hirasawa, 70,
   says just weeks before his wedding 47 years ago, he was given an
   ultimatum - be sterilized, or the wedding would not be allowed to go
   on. He is one of hundreds of thousands of Japanese sterilized under
   massive eugenics program that ended only last year. (AP Photo/Itsuo
   Inouye) 
     _________________________________________________________________
   
   But now the 70-year-old Hirasawa, one of hundreds of thousands of
   Japanese sterilized under a sweeping eugenics program that ended just
   last year, feels only anger.
   
   And with hundreds of others, he is seeking reparation.
   
   ``I was sterilized just like an animal is castrated,'' he said in an
   interview at this isolated leper colony just outside Tokyo. ``It was
   so humiliating.''
   
   Japan's Eugenics Protection Law, written in 1948 to ``avoid the birth
   of defective offspring,'' allowed doctors to sterilize people with a
   broad range of mental or physical handicaps, hereditary diseases and
   leprosy.
   
   Health Ministry statistics show some 844,939 people were sterilized
   from 1949 until 1996, when growing criticism by activists forced the
   law to be abolished.
   
   The policy went virtually unquestioned or ignored by the general
   public - even its abolition was largely unnoticed.
   
   That changed earlier this year when reports surfaced that Sweden
   forcibly sterilized 60,000 people deemed genetically inferior between
   1935 and 1976, causing an international uproar. Soon after, a handful
   of Japanese came forward seeking apologies and compensation from their
   government.
   
   They have yet to receive either.
   
   ``I just want the government to apologize and to have my dignity as a
   human being restored,'' Hirasawa said.
   
   Under the eugenics law, 16,475 people, including 5,163 men, were
   sterilized without their consent; the last involuntary case was in
   1992.
   
   A doctor's recommendation and approval of a committee appointed by the
   local government was enough for sterilizations to proceed. A ministry
   guideline in 1953 approved the use of anesthetics or even deception to
   force the sterilizations on unwilling recipients.
   
   While statistics list most of the sterilizations as being voluntary,
   human rights groups say many of those cases involved deception or
   force.
   
   In Hirasawa's case, colony doctors and nurses assured him he could be
   de-sterilized whenever he wanted to have children. Two years away from
   his 50th wedding anniversary with his wife, Noriko, he still seethes
   over that lie.
   
   ``The more I think about it now, the angrier I feel over what had been
   done to us,'' Hirasawa said. ``I was deceived.''
   
   Japan and Sweden were not alone in having conducted sterilization
   programs.
   
   In Australia, a government-commissioned report issued Monday said
   surgeons in the public health system had illegally sterilized more
   than 1,000 retarded women since 1992. The Health Ministry, however,
   said the true number of cases was one-fourth or one-fifth that.
   
   Arthur J. Dyck, a Harvard professor of population ethics, said the
   United States was for decades a leading proponent of eugenics
   programs, which were conducted in many countries around the world.
   
   The United States stopped such practices after World War II, he said,
   out of shock over Nazi atrocities and increased awareness of human
   rights in general.
   
   ``The cases (in Japan) need to be examined, and not be covered up,''
   he said.
   
   Japan's victims of involuntary sterilization have rarely been heard
   because most remain isolated in institutions, according to Yutaka
   Ichinokawa, a welfare expert at Meiji Gakuin University.
   
   ``Inside institutions, sterilization of the handicapped is largely
   taken for granted,'' he said. ``It's almost impossible for the
   handicapped to reject anything they are told by those who take care of
   them every day.''
   
   In September, the National Federation for the Mentally Handicapped and
   several other groups demanded a government investigation into all
   sterilization cases, a formal apology and compensation.
   
   In Japan, people with handicaps and stigmatized diseases such as
   leprosy long have been treated as second-class citizens based on a
   Buddhist belief that their afflictions stem from bad karma - or fate -
   from their actions in previous lives.
   
   Hereditary problems were considered a disgrace for the entire family,
   and those with handicaps long have been hidden inside their homes or
   special institutions.
   
   Handicapped people continue to face severe discrimination in
   employment and education; public facilities frequently lack wheelchair
   ramps and elevators.
   
   ``Under the Eugenics Protection Law, the government not only forced
   many handicapped people to get sterilized but also reminded them
   constantly that they are the unwanted,'' activist Tomoko Yonezu said.
   
   Hirasawa, meanwhile, is conducting lectures across the country in an
   attempt to change people's attitudes toward the handicapped and the
   ill.
   
   In all his travels, however, there remains one place he can't go.
   
   Because of his disease, though now cured, his family won't allow him
   home.
   
   Copyright 1996 Associated Press. All rights reserved. 

----
   Thirteen former leprosy sufferers are suing the Japanese
   government for keeping them in quarantine for more than 40 years after
   the discovery of an effective treatment.

   The $10.2 million suit is the first attempt to make the government
   legally liable for its quarantine policy.

   Under Japan's 1953 Leprosy Prevention Law, sufferers were kept in
   remote sanitariums with little or no access to the outside world.
   Pregnancies were also forcibly terminated in the mistaken belief that
   leprosy is hereditary.

   Despite a recommendation by the World Health Organization in 1960 that
   such policies were no longer necessary, the Japanese government
   abolished the quarantine law only two years ago. By then, most of the
   residents in Japan's 15 sanitariums were too old to leave.- about
   5,200 stayed on.

Notes about leprosy:

Leprosy rarely spreads through person-to-person contact. Since 1941 it
has been possible to arrest most of the symptoms with medication.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Hunting black bucks by Bollywood heroes

17 Oct 1998


>From kandr@giasmd01.vsnl.net.in Sat Oct 17 23:22:29 1998
Date: Sat, 17 Oct 1998 19:42:00 +0530 (IST)
From: Unquotidian Quotes 
To: ae95015@aero.iitm.ernet.in

A few days back, Salman Khan (popular Hindi film actor) and a few others
cinema people were arrested for hunting and shooting black bucks in the
Bishnoiyan and Kaknani villages. The black buck is an endagered species
and according to Indian poaching laws, poaching of the black buck means a
minimum sentence of 7 years in prison.  What is abominable is that they
cooked the animals and ate them. They were given permission to go there
for shooting for a film. 

Fortunately this came to the news and they were immediately arrested
and remanded to judicial custody. Today Salman Khan was released on a
bail of Rs 50,000. Yesterday a blackbuck, two chinkaras and a peacock
were seized from Salman Khan's father's farm house. It was reported in
the Indian Express that the black buck died on its way to the zoo
because of an overdoze of tranquilizer.

What is most pathetic about this incident is the comments expressed by the
other DUMB asses (I mean everybody) in the film industry. I quote directly
from IE October 16th:

INDUSTRY SUPPORT: Meanwhile, the Mumbai film industry has reacted
acutiously to the incident terming it as "sad" and "unfortunate" and
saying that they will stand by him in his moment of crisis though it will
affect the film business severly.  Film maker Subhash Ghais, said the
incident was unfortunate. Sometimes mistakes are made without being aware
of the consequence and fall out.  
* my comments --- I know that all the people in the film industry are
totally brainless. But I thought they possesed enough brains to realize
that the black buck is a protected species and you dont generally keep
keep these things in your farmhouse and eat it like mutton and chicken.
Guess I was wrong --- 

The film industry is worried when a star is suffering as his films and
their finance will also suffer. Good friend Sanjay Dutt said, "I cannot
say anything on the matter. I myself am in the midst of a court case. All
that I can say is that I fully support Salman.  
* my comments --- Does this mean that this dumbass also would have gone
about shooting animals for eating. What exactly does "I fully support
mean?"

In striking contrast to this Indian attitude an incident involving the
Australian cricket team took place.

The Australian cricket team is touring Pakistan and 3 or 4 days back they
visited some of the border areas of Pakistan. Some of the players posed
along with the security forces holding their guns.  Photos of these were
taken and published in the Australian papers. Most of the Australians were
up in arms - especially the gun control lobby. The Australian cricket team
manager was severly reprimanded by the Australian cricket board (ACB). The
ACB chairman said "the photograph did not conform with the values of the
Australian cricket team." (Do Indians have anything called values?)

The Australian manager was quick to express his regret. "I deeply regret
the image portrayed by the photograph and apologise unreservedly for my
actions." he said.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Politics

16 Oct 1998

This is a nice fortune cookie I got once.

---
REPORTER: Senator, are you for or against the MX missile system?

SENATOR: Bob, the MX missile system reminds me of an old saying that the
country folk in my state like to say.  It goes like this: "You can carry a
pig for six miles, but if you set it down it might run away."  I have no
idea why the country folk say this.  Maybe there's some kind of chemical
pollutant in their drinking water.  That is why I pledge to do all that I
can to protect the environment of this great nation of ours, and put
prayer back in the schools, where it belongs.  What we need is jobs, not
empty promises.  I realize I'm risking my political career be being so
outspoken on a sensitive issue such as the MX, but that's just the kind of
straight-talking honest person I am, and I can't help it. 

	                -- Dave Barry, "On Presidential Politics"

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Politics

16 Oct 1998

This is a nice fortune cookie I got once.

---
REPORTER: Senator, are you for or against the MX missile system?

SENATOR: Bob, the MX missile system reminds me of an old saying that the
country folk in my state like to say.  It goes like this: "You can carry a
pig for six miles, but if you set it down it might run away."  I have no
idea why the country folk say this.  Maybe there's some kind of chemical
pollutant in their drinking water.  That is why I pledge to do all that I
can to protect the environment of this great nation of ours, and put
prayer back in the schools, where it belongs.  What we need is jobs, not
empty promises.  I realize I'm risking my political career be being so
outspoken on a sensitive issue such as the MX, but that's just the kind of
straight-talking honest person I am, and I can't help it. 

	                -- Dave Barry, "On Presidential Politics"

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Ballistic conductance - zero resistance at room temperature

15 Oct 1998

This is an article about which I read a news breif in IEEE Micro August
1998. It said the barest minimum in about 100 words. It also mentioned
that the research was done at Georgia Tech. So I went to www.gatech.edu
and hit their search button on the home page. I gave the search term
"ballistic conductance" and got the first hit as the entire research news
release about this technology/experiment which is reproduced below.

      TINY COMPUTERS OF CARBON? NANOTUBES THAT CONDUCT HUGE CURRENTS
      WITHOUT HEATING COULD BE THE BASIS FOR NEW ELECTRONICS

      A report published in the June 12 issue of the journal Science
      moves researchers one step closer to a practical application for
      electron wave effects in extremely small-scale circuits.

      In the paper, a team of scientists from the Georgia Institute of
      Technology reports observing ballistic conductance - a phenomenon
      in which electrons pass through a conductor without heating it - at
      room temperature in multi-walled carbon nanotubes up to five
      microns long. (A micron is a millionth of a meter).
                                          
      Structures of that size operating under those conditions could one
      day be useful for fabricating ever-smaller electronic devices.
      Their ability to conduct relatively large currents without harmful
      resistance heating would allow use of the very small conductors. 

      "This is the first time that ballistic conductance has been seen at
      any temperature in a three-dimensional system of this scale," said
      Dr. Walter de Heer, a professor in Georgia Tech's School of
      Physics. "There would be interest in this for ultra-small
      electronics, because it shows that you can constrain current flows
      to narrow areas without heating up the electronics. It also
      introduces a new stage of electronics in which the wave nature of
      electrons becomes important."

      In a simple experimental design using the positioning equipment of
      an atomic force microscope, the researchers found that the
      electrical resistance of the multi-walled carbon nanotubes remained
      constant - regardless of their length or width. This quantum
      conductance is not seen in larger structures.

      In an ordinary metal conductor the resitance is directly propotional
      to the length. But in these nanotubes, the resitance is zero -
      independent of the length of the tube!

      That's possible, explained de Heer, because the electrons act more
      like waves than particles in structures whose size approaches that
      of the wavelength of electrons. "The electrons are passing through
      these nanotubes as if they were light waves passing through an
      optical waveguide," he said. "It's more like optics than
      electronics."

      In normal wires, the electrical energy they carry dissipates in the
      conductor, but in the nanotubes, energy dissipates only in the
      leads used to connect the tubes. Such effects had previously been
      seen only in structures a thousand times smaller, and finding them
      in the comparatively large nanotubes was "quite surprising," de
      Heer said.

      "Until now, these effects were considered to be exotic and seen
      only under very special conditions," he said. "Now we are seeing
      them abundantly and easily at room temperature with very simple
      devices."

      The absence of heating allows extremely large current densities to
      flow through the nanotubes. Wang and de Heer measured current
      densities greater than ten million amperes per square centimeter.
      Normal resistance heating would have generated temperatures of
      20,000 K in the nanotubes, well beyond their combustion temperature
      of 700 K.

      Though these effects were measured only in nanotubes of less than
      five microns, such current densities are far greater than could be
      handled by any other conductor, Wang noted. At lengths of more than
      five microns, however, de Heer believes electron scattering may
      defeat the ballistic conductance effect.

      "We can only guarantee that we can carry that kind of current over
      five microns," he said. "We don't know what will happen if you try
      to conduct for longer distances. This will certainly not be a way
      to transport current over large distances."

      In their laboratory, de Heer, Wang and collaborators Stefan Frank
      and Philippe Poncharal attached a tiny electrode to a bundle of
      nanotubes that had a single long tube protruding from one end. They
      mounted the bundle in place of the probe normally used in an atomic
      force microscope and connected a battery to the electrode.

      They then used the microscope controls to raise and lower the
      single protruding nanotube into and out of a pool of mercury that
      served to complete the circuit back to the battery. The resistance
      they measured as the nanotube was raised and lowered into the
      mercury remained constant, changing only when a shorter tube
      protruding from the bundle - which resembles a handful of straw -
      made contact with the liquid metal.

      The researchers measured the resistance of 20 nanotubes of
      different lengths and diameters through as many as 1,000 cycles
      that consisted of dipping them in and out of mercury and two other
      molten metals - gallium and Cerrolow-117. The tubes averaged 15
      nanometers wide and four microns long, but ranged from one to five
      microns in length, with diameters from 1.4 nanometers to 50
      nanometers. The quantum of resistance remained 12.9 kiliohms.

      Despite the importance of the discovery, de Heer cautions that
      electronic devices using nanotube conductors are perhaps decades
      away. One fundamental issue is that carbon materials are
      incompatible with the silicon that is the basis of current
      integrated circuits. Solving that challenge will require a
      revolution in electronic design.

      "It would be like introducing silicon transistors during the age of
      vacuum tubes," he said. "You couldn't combine the two because they
      are from different worlds. This just opens the door, it doesn't
      tell you how to build a better world. This should be seen as the
      proof of principle showing that we can do ballistic conductance at
      room temperature."

      The researchers hope to follow up their work with measurements of
      other predicted device properties of the nanotubes. The research is
      sponsored by the U.S. Army Research Office and the Georgia Tech
      Foundation.

You can find more details at :
   http://www.gtri.gatech.edu/res-news/QUANTUM.html

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Telephone System crash of Jan 1990

14 Oct 1998

For the people not conversant with the subject, on Jan 15th almost all of
the telephones in the US crashed, leaving people unable to communicate
with each other over phone.

The modern telephone system has come to depend, utterly and irretrievably,
upon software.  And the System Crash of January 15, 1990, (in the USA) 
was caused by an *improvement* in software.  Or rather, an *attempted*
improvement. 

As it happened, the problem itself -- the problem perse -- took this form. 
A piece of telco software had been written in C language, a standard
language of the telco field. Within the C software was a long "do...
while"  construct.  The "do... while" construct contained a "switch"
statement.  The "switch"  statement contained an "if" clause.  The "if"
clause contained a "break."  The "break" was *supposed* to "break" the "if
clause."  Instead, the "break" broke the "switch" statement. 

That was the problem, the actual reason why people picking up phones on
January 15, 1990, could not talk to one another. 

                          -- From The Hacker Crackdown

The book "The Hacker Crackdown" is one of the best books I have read. I
recommend it to anybody interested in hacking. You can find the electronic
book at

http://www.eff.org/pub/Security/Security/Crypto_misc/Computer_s
ecurity/Hacking_cracking_phreaking/Net_culture_and_hacking/Hack
ers/Hacker_Crackdown/

PS: The email database will be updated this weekend. So those who dont
want to receive, please ignore these mails.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: 4004 design

13 Oct 1998

Yesterday's UQ could not be posted due to loss of internet connection
here. :-(

The 4004 is the fist example of a comlex random-logic circuit built using
silicon-gate using MOS technology. Silicon gate was essential in obtaining
the samll size and the high speed (for the day) required by a general
purpose CPU. The chip measures 3mmX4mm and integrates approximately 2300
transistor. 

Under Federigco Faggin's direction three layout draftsmen drew the
composite layout of the 4004 using colored lead pencils on mylar at
500 times the actual scale. The composite layout translated the
abstract circuit digram into actual geometry of the trnasistors and
their interconnections. Showing all the masking layers required for
processing, the layout served as a template for the preparation of
"rubies". A rubylith consist of a mylar sheet with a thin layer of
semirtansparent red material can be cut and peeled off. The composte
layout, placed unerneath the ruby, guided the cutting and
peeling operations. One ruby was prepared for each mask layer required
in the wafer processing. The 4004 required six layers including the
scratch procetcion layer; the other chips in the set required five.
The ruby was then photoreduced to 10 times the 4004's actual scale to
prepare the reticle. The reticle in turn, was used to create the actual
scale mask via a step-and-repeat optical process.

IEEE Micro 1996 December.

Extracted from an article written by Faggin himself.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Winchester disks

11 Oct 1998

Winchester disks are disks where the head is aerodynamically shaped
and actually rests ON the disk surface. When the disk starts spinning,
the air pressure lifts the disc up because of the lift produced by the
aerofoil shape.

Because of such an intricate mechanism they are housed in sealed
package and sold.

The term Winchester was originally used by IBM as a code name for
their 3340 disk model prior to announcement. The 3340 was a removable
disk pack with the heads sealed within the pack. The term is now
applied to any sealed-unit disk drive with aerodynamic head design.

Source : Computer Organization and Architecture - William H Stallings.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Starr report

10 Oct 1998

Extract from CMP news digest Thursday 8th, Oct. 1998; I forgot who the
author was.


The release of the entire Starr report on the Internet was not a
calculated act of political sabotage by the Republican party. Rather,
it was a panicked act of surrender. By disenfranchising the
intermediaries that ruled the airwaves for half a century, a precedent
has been set that will undermine the spin doctors of both parties,
along with the millionaire news anchors who serve them.

Let's have it out. Let's have it all out, every bit of dirty laundry in
every nook and cranny in Washington. Let the accusers and the accused go
down together, and by breaking through the fog and smoke, lay waste to a
self-perpetuating political machine that has run amok. 

What old media and hard times created, new media and good times can
destroy.

And as this process unfolds and federal paralysis sets in, perhaps the
people will awake from their stupor and realize that they don't need an
all-powerful president and Congress to "run the country." This country
and its resourceful, hard-working citizens are fully capable of taking
care of themselves.

==============================================
       Copyright 1998 CMP Media Inc.
		  
"The potential of electronic commerce rides on one
fundamental thing, and that is not technology -- it's  policy."

     - Nicholas Negroponte,   MIT media lab guru

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Behaving like a prof.

09 Oct 1998

This is an actual incident that happened to me in my college.

I was working in the Rockets and Missiles lab in the Aerospace department
of IIT, Madras on a software to analyse a video of propellant burning
called erosive burning. Basically what happens is propellant is burnt
inside a transparent chamber and it is recorded on a video camera.
Typically the video lasts for 2-3 seconds. This is then analysed by my
program which reads the tape using a frame grabber card.

I was working with two people, an Assistant prof (i am very friendly and
close to this guy) and a Professor. The Asst. Prof is barely 30 years old
and joined our dept only a year back.  The prof. is a major stud and is 2
years away from retirement. He is a real big shot in combustion and
propulsion.

After all this background, let me tell you the story.

Initially experiments were conducted in subsonic flow. The propellant
block given below is like a rectangle and as it burns the propellant edge
recedes downward.
                                 +-----------------------> propellant edge
                                 |    
                  +--------------+---+   
                  |        |         |
                  |        |         |
                  |        |         |
                           |
                          \|/
                         prop. recedes downward

When these experiments were done, the program worked beautifully and the
propellant edge which recedes was beautifully tracked by my program.

Then one day, they decided to do supersonic tests. For this the propellant
edge looks like the fig. shown below.


                   --------------------\ 
                                         \
                                           \

The slope makes the flow supersonic. But what happened was as the edge
goes down when burning some vague things were seen in the regions where
the burning had finished. The figure looks like below. 

                                     ;    ;       ;
                                     ;     ;     ;
                   --------------------\    ;   ;
                                         \     ;
                                           \

Those ";" were bright "reddish yellow" regions seen in the background. My
program saw all these things and could not detect the edge properly and
generated junk. So I first called the asst. prof. and showed him this. He
said "Those lines are mach waves!" with a very intelligent look and then
added "I have no clue what it is, but I am just trying to act like a prof,
as if I always know what is happening."

Later in the day, when the Prof. came to the lab, I showed it to him. He
saw it at once and said. "Ah, those are the mach lines. You remember you
learnt it in gas dynamics." in a very scholarly tone. The asst. prof was
also in the room and I looked it him and just could not help bursting out
laughing.

So now all of you who are aspiring to become a learn your first lesson. 

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Internet credibility - Merced

08 Oct 1998

The following is an extract from the CMP Techweb News digest September
23rd, 1998. The most interesting part of the story is in the end. So dont
ditch this mail inbetween even if you do not understand some of the
technical fundas.

The funda in this posting has nothing to do with the technical aspects of
the Merced. 

--- begin 

Merced deals in speculation 
 
By Alexander Wolfe

Thanks to some sources in the know, I've come into additional
information on the inner workings of Intel Corp.'s upcoming 64-bit
Merced microprocessor. This week, we'll take a look at speculation and
related matters; other areas will be covered in future columns.

Merced will usher in a new kind of cooperation between on-chip hardware
and the compiler. Given its very-long-instruction-word (VLIW) heritage,
Merced will contain a large number of parallel execution units. In
exchange, the compiler will organize instructions into instruction
streams that can be simultaneously executed.

To obtain those streams, the compiler will rely on two software
techniques: predication and speculation. The former removes unneeded
branches from a program; the latter masks memory latency by executing
load instructions as early as possible.

However, there's a little mystery hidden within Intel's nomenclature.
Intel has used "speculation" as an umbrella term. What Intel hasn't
revealed is that Merced will implement two types of speculation:
control and data.

What Intel has discussed to date is really control speculation. That
is, it's the procedure by which instructions are moved up above the
branch. Control speculation is a well-known technique and is broadly
applicable; that is, lots of code can benefit from its use.

The second method, data speculation, is much harder. Data speculation
essentially means that when a memory access is performed, the compiler
is not sure whether the access is valid or not. An example might be
moving one store instruction way above another store instruction.

Data speculation is less broadly applicable, but on those portions of
code where it does work, it can deliver performance boosts of 20 to 30
percent. (A further complication is that there are two definitions of
data speculation floating around; the kind I've described is the method
according to the less-stringent definition.)

Merced is also fitted with specific features to speed the execution of
tight inner loops-small blocks of code that are executed repeatedly. To
that end, Merced will implement rotating registers, my sources tell me.
This feature boosts the performance of inner loops by enabling Merced
to use "software pipelining." Merced's branch instructions will also be
outfitted to support these fast loops. And Merced will probably allow
multiple, simultaneous writes to its registers.

Finally, a correction to an item in a previous column: Intel tells me
that Katmai, (its upcoming, advanced 32-bit processor) will initially
ship in 450-MHz (not 400-MHz, as I wrote last month) and 500-MHz
versions. 
 
============================================= 
       Copyright 1998 CMP Media Inc. 

--- end

ALL of this was extensively discussed in a *April 1997 Byte* (almost a
year and a half ago) article which I have read. A sad reaffirmation of
the lack of accountability and credibility of things said on the internet. 
Which means all this info was released by Intel long time back, and we
dont need "a person in the know" to give us such "sneak previews."

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Technical Information

07 Oct 1998

The following text is verbatim reproduction of technical information that
I found on the leafleet of a music CD that I bought.  It is a CD of the
great Jazz musician Dizze Gillespie. 

Technical Information

Recorded live at the Blue Note, New York City, January 29-31 and
February 1, 1992
Microphones: Overall Pickup: Schoeps MK-6 in M/S stereo
Piano: B & K 4006   Bass: Audio-Technica ATM-35
Drums: B & K 4011   Trumpets: Sennheiser MKH-40   DizzyL ATM-35
Console: Ramsa WR-824S custom engineered by Jogn Windt
Digital Recording Processor: Ultra-Analog 20-Bit, 128 times
oversampling A/D custom engineered by Kenneth Hamann.
Monitor Speakers: ADS 1530 wired with Monster Cable
Monitored Through Madrigal Audio Labs Proceed PDP-II D/A
Power Amplifier: Krell KSA-250
The signal path utilized the latest cable technology from Monster
Cable including M1000, Msigma2 Series I Prolink and Series III Prolink
bandwidth balanced
Exclusive Control Room Acoustic Treatment: RPG Abfussors and Diffuros
Digital Editing: Sony DAE 3000

During the recording of the digital masters and the subsequent
transfer to disc, the signal was not passed through any processing
device (ie compression, limiting or equalization) at any step during
production.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: Ken Starr!

06 Oct 1998

"Public media should not contain explicit or implied descriptions of sex
acts. Our society should be purged of the perverts who provide the media
with pornographic material while pretending it has some redeeming social
value under the public's 'right to know'."

                               - Kenneth Starr, 1987,"Sixty Minutes" 


UQ: Y2K on the GPS

05 Oct 1998

The Y2K Boogeyman 
 
By Fred Langa, TechWeb contributor

The scare stories abound -- but how much Y2K trouble do you
realistically expect? 

Late week, the San Jose Mercury News broke a small Y2K-type story I
hadn^Òt seen written about before: It turns out when the government
designed the Global Positioning System about 20 years ago, memory
constraints caused it to run the ultra-precise GPS clocks on a
one-kiloweek (1,024 weeks) cycle. 

Guess what? About 972 weeks have passed. In almost exactly a year from
now -- at 17:59:00 ET on Aug. 21, 1999 -- the GPS chronometers roll
over and begin a new 1,024-week count, starting from zero. 

Most new GPS units won^Òt be bothered by the kiloweek rollover, but some
older models could suddenly freeze or produce wildly inaccurate
results. You probably wouldn^Òt want to be far at sea in a ship or high
in the clouds in a plane with one of these old units next summer. 

Worse, many of those same older units may also have trouble just a few
months later with the Y2K bug itself. 

The report was refreshing because it was so specific, in marked
contrast to many of the Y2K reports cropping up. TechWeb and the most
recent issue of Wired, for example, featured interviews with Y2K
techno-catastrophists who have left their jobs as programmers or IT
professionals and literally headed for the hills: They truly believe
civilization will grind to a halt on Jan. 1, 2000, as the electric
grids, communications systems, transportation networks, and banking
infrastructures grind to a halt. As a result, they^Òre holing up in
remote shelters and boning up on obscure skills such as tanning hides
and subsistence farming. 

They even have a new piece of jargon for the Y2K effect: TEOTWAWKI.
It^Òs pronounced tee-awt-waw-key, and it^Òs an acronym for "the end of
the world as we know it."

Really. 

I can easily believe there^Òll be scattered problems with small systems
or networks and some unexpected problems similar to the GPS issue. But
I can^Òt believe it^Òs TEOTWAWKI, or even that anything significant will
change at all. It^Òs too well-publicized a problem with too many good
solutions and workarounds for it to be a world ender. 

Fred Langa is a senior consulting editor and columnist for Windows Magazine. 

Source: Techweb News - 23rd Sept.


UQ: UNIX

03 Oct 1998

"I liken starting one's computing career with Unix, say as an
undergraduate, to being born in East Africa. It is intolerably hot, your
body is covered with lice and flies, you are malnourished and you suffer
from numerous curable diseases. But, as far as young East Africans can
tell, this is simply the natural condition and they live within it. By the
time they find out differently, it is too late. They already think that
the writing of shell scripts is a natural act." 
						-- Ken Pier, Xerox PARC 

http://catalog.com/hopkins/unix-haters/preface.html


UQ: Compaq Grand Slam cup prize money

02 Oct 1998

One of the year ending championship in tennis is the Grand Slam Cup, where
normally a select group in the top 16 in the ATP ranking are invited to
play. This tournament has the richest prize money, much more than any of
the Grand Slams. So much so, that once Boris Becker refused to play in it
citing the "obscene amount of prize money."

This year Andre Agassi defeated Cedric Pioline in 34 minutes flat, 6-0,
6-0 to reach the quarter finals. This was the quickest match since
the tournament was started in 1990. Pioline won only eight point in the
first set and nine points in second set - that makes it 17 points TOTALLY
in the WHOLE match.

For this match Andre Agassi received a prize money for $175,000. Pioline
received $100,000. This was a first round match. So for doing absolutely
nothing Pioline received this prize money.

The career prize money of Serena William is $251,428. She has been playing
for around a year now. Pioline earned approx half of that by winning just
17 points in a match! 

Leander Paes had earned only $116,417 the whole of this year. His
career earning are $1,292,554. Cedric Pioline himself had earned only
$589,228 before the US Open 1998.

Total prize money involved in the tournament is $6.7 million

PS: After an entire days work at the Billiards table in the world
championship finals yesterday Geet Seethi defeated Mike Russell
and received only 10,400 pounds.

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


UQ: wavelet transform

01 Oct 1998

The following is an extract from a book on Wavelets. If you want more
details please contact me by email.

---

In fact, our ear uses a wavelet transform when analyzing sound, at
least in the very first stage. The pressure amplitude oscillations are
transmitted  from the eardrum to the basilar membrane, which extends
over the whole length of the cochlea. The cochlea is rolled up as a
spiral inside our inner earl imagine it unrolled to a straight
segment, so that the basilar membrane is also stretched out. We can
then introduce a coordinate y along this segment. Experiment and
numerical simulation show that a pressure wave which is a pure tone,
fw(t) = exp(iwt), leads to a response excitation along the basilar
membrane which has the same frequency in time, but with an envelope in
y, Fw(t, y) = exp(iwt) * phiw(y). In a first approximation, which
turns out to be pretty good for frequencies w above 500 Hz, the
dependence on w of phiw(y) corresponds to a shift by log(w): there
exists one function phi so that phiw(y) is very close to 
phi(y - log(w)). 

(Using these facts if do some elementary mathematics in integrals, we
can arrive at the fact that the ear uses a wavelet transform.)

The occurence of the wavelet transform in the first stage of our own
biological acoustical analysis suggests that wavelet-based method for
acoustical analysis have a better chance than other methods to lead,
eg to compression schemes undetectable by our ear.

Source: Ten Lectures on Wavelets - Ingrid Debauchies
Published by SIAM.

You can find more information about wavelets at
http://www.mathsoft.com/wavelets.html
and http://www.wavelet.org

---------- U N Q U O T I D I A N    Q U O T E S ----------
(un)subscribe  by  sending  e-mail  to  kandr@bitsmart.com
----------      http://kandr.home.ml.org/       ----------


1