Van Smith

I am best known as a writer and analyst on computer technology topics. One of my articles was widely credited with causing Rambus stock to plunge $150 per share in a single day. In that article, I showed that the performance claims the company made did not hold up under testing. That article and a few others were used in the FTC case against that company which eventually led to conviction. I have covered computer benchmarks for many years. Computer benchmarks are typically software programs that are used to measure how fast computer systems are. I am probably one of the world’s foremost authorities on consumer and business level computer benchmarks. I have influenced or directly contributed to many of the most widely used computer industry benchmarks. For instance, I wrote the cryptography benchmarks in SiSoftware Sandra. Information I uncovered on Intel’s influence over industry benchmarks is now being investigated in FTC's current case against Intel. I was the only analyst in the computing industry to identify the shortcomings of Intel’s NetBurst architecture used in the now defunct Pentium 4 line of microprocessors. The flaws I identified eventually caused Intel to lose market share to its rival AMD. These flaws eventually led to Intel’s abandonment of NetBurst many years ahead of initial expectations. I am less proud of the fact that I was instrumental in the demise of x86 microprocessor designer Transmeta. Representatives from one of Transmeta’s most important customers told me that they dropped Transmeta products after reading my articles on Transmeta CPUs. Additionally, I created the performance message that allowed VIA Technologies to become the world’s leading supplier of x86 thin client CPUs. VIA took this crown away from Transmeta. For about eight years I was head of benchmarking for Centaur Technology, one of three remaining x86 microprocessor designers. I recently resigned from Centaur to form my own company, Cossatot Analytics Laboratories – Cana Labs for short. My company provides validation, performance testing, energy consumption characterization and software development services. We also write software tools for benchmarking and validation testing.

Polish Plane Crash Documentary

 News  Comments Off on Polish Plane Crash Documentary
Dec 302010
 

Last spring, a Polish military plane crashed in western Russia effectively decapitating the Polish government.  A serious documentary film questioning the official story surrounding the tragic crash is now available for free viewing on the Internet.  Several parts of the film are embedded below in this article.

The documentary, which includes interviews with top government officials like Ukraine’s former President Victor Yushenko, lays the blame for the horrific crash at the feet of the Russian government. The Polish crash is depicted as a covert coup d’etat to undermine the independent nature and growing strength of Poland.

President Yushechenko was the target of an assassination attempt in 2004 that left him disfigured. He believes that Russia sponsored his would-be assassins. Like deceased Polish President Lech Kaczynski who was killed in the crash, Yushechenko was a democratizing force in a former Soviet controller area of Eastern Europe.

However, the filmmakers also criticize the effectual boycott of the Polish funerals by leaders of the Western World as signal of their solidarity with Russia’s actions.

The European Union is also viewed as complicit in the murder of Poland’s top governmental officials. The head of Poland’s Central Bank rejected overtures from the International Monetary Fund (IMF) only days before he too was killed alongside 96 others in the Polish plane crash last April.

Coincidentally, Nigel Farage, an outspoken British critic of the European Union, was injured in a plane crash last month after delivering the scathing attack on the full-time European Council President, Herman Van Rompuy, seen below. Farage claimed that Van Rompuy’s “intention is to be the quiet assassin of European democracy and of European nation states.”

Dec 212010
 

After many months of trying to wring something out of NVIDIA, I have finally obtained a Tegra 2-based device.  It is in the form of the ViewSonic G Tablet, a 10″ Android 2.2 (Froyo) based slate computer.  We bought it from Sears, of all places.  Oddly enough, Sears has one of the largest selections of tablet devices you can find.

Despite its complete lack of refinement, this thing is awesome, but only if you don’t mind wiping out the stock ROM.  The G Tablet’s shipping GUI looks like it was designed for toothless nursing home residents with computer-phobia and a lot more patience than I possess.  Obviously, ViewSonic wanted the device to be embraced by mainstream consumers so they dumbed-down the Android 2.2 interface with a sluggish, buggy and artificially limited mess of an overlay.  To make matters worse, the Android Market is nowhere to be found.

ViewSonic really shot themselves in the foot with the G Tablet.  They were first to the U.S. market with a dual-core Tegra 2-based device.  All they had to do was slap on a standard Froyo installation with a full Android Market and the device would have been a runaway hit for them this Christmas season.  But nooooooooooo!  ViewSonic had to get all greedy with visions of iPad’s success with mainstream buyers.  The resulting, lousy Tap ‘n Tap interface is like pouring a pound of aspartame over a steak dinner.  Sprinkled with bugs, the unsavory kind.

Fortunately, if you are a computer geek then it is not too difficult to flash the G Tablet’s firmware with a proper Android environment.  It’s also a fairly safe process since someone at ViewSonic had the foresight to make the device relatively brick-proof.  I’ve been using TnT Lite 3.0, but there are other options as well.  Yes, there will be headaches along the way, but geeks like me enjoy hacking a new device.

And, frankly, I have not been this excited about a new genre of computing device in many years.  The promise of the iPad was immediately evident to me when we bought one last spring.  However, a properly prepared G Tablet runs circles around the iPad.  Android-based tablets are going to dominate the marketplace by this time next year.

Of course, we bought the device for our business to benchmark and analyze.  Tegra-2 appears to be even faster than I anticipated.  The G Tablet finished under 2.5 seconds on SunSpider using Firefox Mobile 4.0 beta 2.  When I wrote my ARM versus x86 treatise last spring, the 800MHz Cortex-A8 took over 14 seconds on SunSpider while the 1GHz Intel Atom needed over 8 seconds, about as fast a my updated iPad takes today.  Note, however, that Firefox’s JavaScript performance has improved enormously over that time.  On the other hand, remember that JavaScript is still single-threaded, so half of the Tegra-2’s performance is left untapped on SunSpider.

There’s been weeping, moaning and gnashing of teeth over the quality of the G Tablet’s display.  Truth be told, those people are crybabies.  Yes, it’s not as good as the IPS screens on the iPad or the B&N NOOKcolor, but it’s not awful either (its biggest problem is blinding glare, not its relatively limited viewing angles compared to IPS displays).  However, I was expecting more from ViewSonic, a company best known for its outstanding history as a computer monitor vendor.  But given the general unrefinement of the device, I was not too surprised.  I mean, one look at the dingy, off white G Tablet box shows that the challenges of marketing a tablet computer are currently beyond ViewSonic.  I had to take out a ViewSonic monitor box to confirm my suspicion that apparently the monitor and tablet marketing folks at ViewSonic apparently never speak to one another.

Anyhow, it’s not too late for ViewSonic.  They need to ditch tepid Tap ‘n Tap for a real, full Android experience, enable a complete Android Market, push device driver updates to the tablet and recognize the G Tablet for what it is: a Grade A geek toy.  In fact, it appears that ViewSonic decided to take a step in this direction today by promising to push out a new firmware edition before Christmas that will not only improve Tap ‘n Tap, but will also give the user the option to boot into a stock Android interface.

Penetrating the mainstream marketplace will require hardware tweaking like adding an IPS screen, improving the lame webcam, rubberizing the case and bezel, adding mechanical Android buttons and dramatically rethinking the case ink and finish.  If they want a nearly perfect tablet, ViewSonic can add a digital compass, GPS and rear-facing camera.

We’ll be testing the ViewSonic G Tablet and writing benchmarks specifically for this purpose.  Hopefully, we’ll have results to report soon.

Dec 202010
 

If you are Jonesing over the Apple iPad but can’t afford half-a-grand for a baseline 16GB WiFi version, the $250 Barnes & Noble NOOKcolor is a good alternative.

Sporting twice the amount of RAM (512MB) along with 8GB of flash memory (expandable to 40GB thorough a microSD slot), the well-designed NOOKcolor has hardware features that are very competitive with the iPad’s.  The excellent 7″, capacitive, multiTouch, IPS LCD at 1024×600 resolution nearly matches the iPad’s 1024×800 pixel count but at a much higher pixel density.  The NOOKcolor’s 800MHz ARM Cortex-A8 is almost as fast as the iPad’s 1GHz A8.  WiFi connectivity appears to be better on the NOOKcolor than on the iPad.  From my own experience, battery life is very good and approaches the iPad’s.

The only features missing on the NOOKcolor that are present on the iPad are a microphone, Bluetooth and compass.  The NOOKcolor might also lack an ambient light sensor; although there appears to be a place for one to the left of the home button, there does not appear to be any software support for a light sensor yet.

Arguably the best eReader currently available, the NOOKcolor is easily rooted using Auto-Nooter by following the directions here.  You will also need to install LauncherPro or some other similar program to access apps installed using the Android Market.  Once rooted, the NOOKcolor becomes the best Android-based tablet for the money.

Of course, the iPad’s App Store is unmatched, but the Android Market is nothing to sneeze at.  Previous purchases from the Android Market will automatically become available for installation on the rooted NOOKcolor, and this is a big advantage for Android-based devices.  While iPad users might enjoy a greater variety of software choices, the Android universe is exploding with new devices and all of your Android Market software purchases will carry over to any of them (although some programs might not run properly on every platform).

Rooting the NOOKcolor is not without problems.  The process is still young and requires perseverance, patience and a modicum of technical acumen.  Rooting the NOOKcolor might also void the device’s warranty and could possibly interfere with future official B&N operating system upgrades including the upgrade to Android 2.2 (Froyo) planned for January.

But having used both devices, the rooted NOOKcolor is responsive and fun.  Games like AngryBirds are every bit as good on the NOOKcolor as on the iPad.  The outstanding email client is equal to the iPad’s and the Dolphin Browser, available through the Android Market, is a better browser than the iPad’s limited version of Safari.  While the iPad’s touch screen might currently be a little more responsive and accurate, this could change in the NOOKcolor’s favor when the Froyo upgrade soon becomes available.

None of the NOOKcolor’s original functionality is affected by rooting, but it is satisfying to load the Amazon Kindle Android application onto the NOOKcolor so that you can read all of your Kindle books in a better format than any Kindle delivers.

So if you are feeling a little daring, the NOOKcolor is a terrific eReader that makes a great tablet when rooted.  The rooted NOOKcolor is a very strong, inexpensive alternative to the WiFi Apple iPad.

Dec 172010
 

Kathy’s 79-year-old uncle, Dr. Paul Magelli, is traveling to Arusa, Tanzania, to climb Africa’s tallest mountain, Mt. Kilimanjaro.

Uncle Paul will be the oldest person ever to ascend to the top of the 19,380 foot peak.  His climb begins January 5th.  He expects to reach the summit on January 12.

You can follow his journey here.

FBI ‘Conspiracy’ Infiltrated OpenBSD, Created Backdoors into Internet Networking Code

 Computer news, News  Comments Off on FBI ‘Conspiracy’ Infiltrated OpenBSD, Created Backdoors into Internet Networking Code
Dec 152010
 

An open source operating system lauded for its security features appears to have been infiltrated by the FBI over a decade ago resulting in the covert injection of eavesdropping code allowing the U.S. Government to snoop certain types of commonly used encrypted network traffic.

Security expert and OpenBSD leader Theo De Raadt forwarded to the openbsd-tech mailing list an email from an old associate who claims the Federal Bureau of Investigation hired his company to create secret backdoors into the OpenBSD Crypto Framework IPsec networking stack about ten years ago.  According to de Raadt, “large parts of the [IPsec] code are now found in many other projects/products.”  Indeed, IPsec is the basic toolset for securing Internet Protocol (IP) communications across the Internet, and the OpenBSD implementation of IPsec is widely used.

Apparently experiencing a change of conscience since then, de Raadt’s former associate, Gregory Perry, further suggests that OpenBSD lost its DARPA funding because DARPA was aware of these covertly implemented security vulnerabilities.  Theo de Raadt writes:

I refuse to become part of such a conspiracy, and
will not be talking to Gregory Perry about this.  Therefore I am
making it public so that
(a) those who use the code can audit it for these problems,
(b) those that are angry at the story can take other actions,
(c) if it is not true, those who are being accused can defend themselves.

If true, this successful FBI “conspiracy” represents a serious blow to the credibility of open source security efforts.  Up until now, OpenBSD has been widely viewed as one of the most secure operating systems available.

The full text of the email, which came from here, is below.

List:       openbsd-tech
Subject:    Allegations regarding OpenBSD IPSEC
From:       Theo de Raadt
Date:       2010-12-14 22:24:39
Message-ID: 201012142224.oBEMOdWM031222 () cvs ! openbsd ! org
[Download message RAW]

I have received a mail regarding the early development of the OpenBSD
IPSEC stack.  It is alleged that some ex-developers (and the company
they worked for) accepted US government money to put backdoors into
our network stack, in particular the IPSEC stack.  Around 2000-2001.

Since we had the first IPSEC stack available for free, large parts of
the code are now found in many other projects/products.  Over 10
years, the IPSEC code has gone through many changes and fixes, so it
is unclear what the true impact of these allegations are.

The mail came in privately from a person I have not talked to for
nearly 10 years.  I refuse to become part of such a conspiracy, and
will not be talking to Gregory Perry about this.  Therefore I am
making it public so that
(a) those who use the code can audit it for these problems,
(b) those that are angry at the story can take other actions,
(c) if it is not true, those who are being accused can defend themselves.

Of course I don’t like it when my private mail is forwarded.  However
the “little ethic” of a private mail being forwarded is much smaller
than the “big ethic” of government paying companies to pay open source
developers (a member of a community-of-friends) to insert
privacy-invading holes in software.

—-

From: Gregory Perry
To: “deraadt@openbsd.org”
Subject: OpenBSD Crypto Framework
Thread-Topic: OpenBSD Crypto Framework
Thread-Index: AcuZjuF6cT4gcSmqQv+Fo3/+2m80eg==
Date: Sat, 11 Dec 2010 23:55:25 +0000
Message-ID: <8D3222F9EB68474DA381831A120B1023019AC034@mbx021-e2-nj-5.exch021.domain.local>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Content-Type: text/plain; charset=”iso-8859-1″
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Status: RO

Hello Theo,

Long time no talk.  If you will recall, a while back I was the CTO at
NETSEC and arranged funding and donations for the OpenBSD Crypto
Framework.  At that same time I also did some consulting for the FBI,
for their GSA Technical Support Center, which was a cryptologic
reverse engineering project aimed at backdooring and implementing key
escrow mechanisms for smart card and other hardware-based computing
technologies.

My NDA with the FBI has recently expired, and I wanted to make you
aware of the fact that the FBI implemented a number of backdoors and
side channel key leaking mechanisms into the OCF, for the express
purpose of monitoring the site to site VPN encryption system
implemented by EOUSA, the parent organization to the FBI.  Jason
Wright and several other developers were responsible for those
backdoors, and you would be well advised to review any and all code
commits by Wright as well as the other developers he worked with
originating from NETSEC.

This is also probably the reason why you lost your DARPA funding, they
more than likely caught wind of the fact that those backdoors were
present and didn’t want to create any derivative products based upon
the same.

This is also why several inside FBI folks have been recently
advocating the use of OpenBSD for VPN and firewalling implementations
in virtualized environments, for example Scott Lowe is a well
respected author in virtualization circles who also happens top be on
the FBI payroll, and who has also recently published several tutorials
for the use of OpenBSD VMs in enterprise VMware vSphere deployments.

Merry Christmas…

Gregory Perry
Chief Executive Officer
GoVirtual Education

“VMware Training Products & Services”

540-645-6955 x111 (local)
866-354-7369 x111 (toll free)
540-931-9099 (mobile)
877-648-0555 (fax)

http://www.facebook.com/GregoryVPerry
http://www.facebook.com/GoVirtual

Nov 142010
 

Over the last few years, the Transportation Security Administration has implemented increasingly invasive yet illogical and ineffective airport security measures.  While the USA’s borders remain wide open to malicious invaders, American travelers are subjected to x-ray naked body scanning that has been broadly compared with automated strip searches.  And now, opting out of naked body scans results in pat-downs that would qualify as sexual assault if carried out under similar conditions by the same TSA officials only a few months ago.

TSA’s “groping” pat-downs appear to have triggered a tipping point in public sentiment, with outpourings of resistance erupting from every sector of American society.

Obama Administration’s Homeland Security Secretary Janet Napolitano has become the target of widespread derision for her part in rolling out TSA measures that would have been universally condemned as outrageous only a few years ago.

Derisively called “Big Sis” as reference to her Orwellian approach to security as well as to her robust physical features, Napolitano had to anticipate public backlash to TSA groping procedures implemented only weeks before Thanksgiving, the start of the busiest travel season in the country.  Moreover, mainstream media is stoking the public fires of outrage, a sure sign that Napolitano’s gambit was intended from the start to make Americans angry.

The question then becomes, what is Homeland Security’s ultimate goal given that the TSA’s absurd intrusiveness is a concocted ruse?

Almost certainly, the recent TSA affronts to our dignity is a tactic to make the American public receptive for a biometric tracking database implemented as part of a national ID card system.  Since biometric ID can be balky, slow and inconvenient, implanted radio frequency identification microchips which can be scanned quickly and at a distance will be the ultimate solution.

Expect a false flag attack to be used in the upcoming months to convince the American public that extreme, “enhanced” airport security measures are necessary for keeping us safe from terrorists.

The Myth of the Illegal Alien Migrant Worker

 Analysis, Opinions, Site news  Comments Off on The Myth of the Illegal Alien Migrant Worker
Sep 252010
 

Illegal immigration is a huge problem in the United States.  Crime, disease, terrorism, declining wages for Americans and the breakdown of social infrastructure like schools and hospitals are increasingly serious concerns.

However, the media and the Congress are attempting to leverage one issue where many people have sympathy for the influx of illegal aliens: the plight of migrant farm workers.

Perhaps Americans have forgotten, but migrant farm workers used to come from our own country.  My mother and her family would travel all over the country to work on farms to pick cotton, strawberries, tomatoes, watermelons, peppers or whatever crop was in season.

My mother, now in her late seventies and who is half Apache and half Cherokee, often recounts stories of working in the fields.

Americans are willing to work hard; Americans set the world’s standard for hard work.  The problem is that in many areas of the country the wages have been severely undermined by waves of illegal immigrants who hail from the impoverished regions of Third World countries and who require much lower pay than Americans, partially because few of them pay any taxes.

In other words, illegal immigration has destroyed the job market for Americans seeking employment as farm laborers.

The meat packing industry has been even more seriously hit.  A few decades ago, many jobs in the meat packing industry paid over twenty dollars per hour.  Since the floodgates have opened to illegal immigration, jobs in the meat packing industry barely creep over minimum wage and working conditions are now much worse, almost certainly explaining the exploding rates of food borne illnesses.

Distributed Denial of Service Attack against vanshardware.com

 Site news  Comments Off on Distributed Denial of Service Attack against vanshardware.com
Aug 202010
 

The vanshardware.com server has been the target of a Distributed Denial of Service (DDoS) attack for about the last ten hours. Not only has our website been down, but our email server has not been functioning properly.

A DDoS is commonly carried out by a virus maker who has taken control of many infected personal computers from a remote location. The virus maker then directs his army of infected computers to attack a particular website. Because the attack may come from many thousands of computers at once, it is difficult and tedious to block the incoming malicious requests to the server without blocking legitimate traffic as well.

System administrators tending our server have been blocking the IP addresses attacking our server. Within the last hour, it appears they have been successful in reducing the severity of the issue enough that our website is becoming accessible once again.

Hopefully this issue will be completely resolved soon.

Jul 242010
 

In what some are calling an act of war, a report from Diggers Realm claims that the notorious Mexican drug syndicate, Los Zetas, has captured at least two American ranches near Laredo, Texas, and have entered into a standoff with local law enforcement and the Border Patrol.

I can personally vouch that this info came in late last night from a reliable police source inside the Laredo PD. There is currently a standoff between the unknown size Zeta forces and U.S. Border Patrol and local law enforcement on two ranches on our side of the Rio Grande. The source tells us he considers this an “act of war” and that the military is needed on the border now!

The Zetas are heavily armed with grenades, rocket launchers, .50 caliber machine guns, surface to air missiles and helicopters and have been in direct conflict with the Mexican Military for years.

Jul 242010
 

The globalists’ insane Communist test lab of North Korea has threatened nuclear war this weekend if provoked by a joint U.S.-South Korea military exercise.  The BBC reports:

“The army and people of the DPRK will start a retaliatory sacred war of their own style based on nuclear deterrent any time necessary in order to counter the US imperialists and the South Korean puppet forces deliberately pushing the situation to the brink of a war,” it added.

About a month ago, semi-retired Cuban leader Fidel Castro promised nuclear war by July 2. When the date came and went without incident, Castro expressed relief, but then continued to warn that nuclear war was immediately imminent during later television interviews.

I do not recall this level of extreme and frequent dialog regarding immediate nuclear exchanges in my 47+ years of life.

Jul 242010
 

Over the last week, a multipronged attack on free speech has come to light.

Leading the assault is Las Vegas-based copyright troll “Righthaven” led by Steve Gibson. On the fast track to becoming the most loathed person on the Internet, Gibson buys up copyrights to newspaper articles published in cyberspace and runs a Web crawler to locate sites that contain material from them. Gibson then sends shakedown letters to the Website owners threatening copyright violation fines up to $150,000 unless the owner pays Gibson off. Note that these malicious letters are NOT preceded by take-down requests, so site owners, several of whom run large message boards and news aggregators and therefore cannot vet all posts, are caught off guard with little apparent recourse without costly legal counsel.

Apparently possessing a death wish, Gibson has targeted bikers, patriots, gun rights advocates and Internet paranoids first. Making the job for the pitchforks and torches mob easier, Gibson, the egotistical walking enema, allowed Wired to publish a picture of his ugly, smirking mug for all to see.

A second prong of attack is led by the Reuters news agency and their paid attack dog Attributer Corporation. This pack of goons is trying a similar shakedown of sites like Godlike Productions, a very popular message board focusing on conspiracy themes. You can read about that ongoing issue here and here.

Of course, what is not discussed is that Websites dearly want to be quoted and linked to from as many sources as possible. A link from Reddit or Godlike Productions can generate tens of thousands of page views and boost a website’s visibility into another league. This is simply the most reliable way of generating traffic. No, these lawsuits are not meant to help prevent content “stealing,” but are rather insidious efforts bordering upon extortion.

Finally, the mainstream media has unleashed their hounds on bloggers and other small, independent media Websites who have become the main conduit of news in our society today. According to NewsBusters:

CNN’s two regulation-happy reporters, think the Sherrod situation can help bring attention to the “necessity” of blogging reform if she brings a defamation lawsuit against Andrew Breitbart.

According to Roberts, Sherrod has “the power now and she also has the profile to maybe bring this into a new light, so we’ll see where this goes.”

Are these efforts the beginning of a coordinated attack against Internet free speech during a dangerous time when our nation’s economy continues to degrade to depths last plumbed during the Great Depression? Time will tell.

Jul 222010
 

The astronomy photo of the day comes courtesy of NASA’s Solar and Heliospheric (SOHO) orbiting solar observatory.  An enormous, fiery, winged shape can be seen as if emerging from the sun’s broiling surface to the upper right of the occlusion disk.  For extra win, a trail of pixie dust follows it.

Strange SOHO image

A strange, winged figure apparently emerging from the sun

Full of win!

Full of win!

Jul 212010
 

It’s difficult to express the sheer absurdity of this story, but it perhaps helps explain why our country is falling so swiftly. Are we truly this pathetically stupid and our schools and police this tyrannical and amoral?

A 15-year old boy ate chicken nuggets given to him by a friend.  As a result, the police arrested him and took him away in handcuffs.

Ava Hernandez got a disturbing voicemail message from the Assistant Principal of Shorewood High School in March. Her 15-year-old brother Adam has been taken into police custody. She says, “It was because his friend had shared a lunch with him and he was accused of stealing [It] was really, I don’t know, it was just over the top.”

Adam was accused of stealing chicken nuggets from a $2.60 meal. Those are the nuggets his friend, Gakaree Garner, gave to him. Garner says, “Although that month I was fasting so I couldn’t eat meat, and we had chicken nuggets that day.”

Garner says, “They actually put him in handcuffs, and actually tried to force him into the car.”

Adam Hernandez was slapped with a theft citation and a $170 fine. However, after public outrage following news coverage from a local television station, the school principal and the police chief dropped the charges like a hot potato.

Jul 092010
 

For many people, Apple Computer’s co-founder, Steve Jobs, exists on a higher plane than the one mere mortals occupy. It’s a peculiarity of our modern world that a gadget designer can find himself at the center of a personality cult.

Certainly, Steve Jobs’ uncompromising direction has played a huge role in Apple’s success.  However, out of necessity, Apple employees take a more pragmatic view of the world’s most famous Steve.

The collective company lore, primarily involving Mr. Jobs, is often passed down to new Apple initiates through a series of tales.  One such bit of verbal history unfolds as follows.

A young man entered an elevator at Apple’s 1 Infinite Loop headquarters located smack in the middle of California’s Silicon Valley.  Satisfied after waiting a few seconds that no one else was boarding, he pressed the button for the first floor.  Just before the elevator closed completely, a hand sliced through the narrowing gap, activating the infrared switches and separating the metal doors like Moses parting the Red Sea.  In stepped a purposeful man wearing a black St. Croix turtleneck, Levi 501 blue jeans and a pair of New Balance sneakers.  Preoccupied with thoughts of returning home after a hard day’s work, it took the young man a few seconds to realize that the older man standing next to him, alone in the descending elevator, was the iconic Steve Jobs.

Clearing his throat and attempting to be friendly, the young man chirped a common salutation.  “Hi, Mr. Jobs, how are you,” he queried in a quivering voice sounding about an octave higher than normal.  After a few awkward seconds of silence elapsed, the young man continued, “It’s a beautiful day today, isn’t it?’

Seeming slightly perturbed, the fruity messiah shot back, “So what have you done for Apple lately?’

Temporarily flummoxed by how his innocent elevator ride suddenly turned into a confrontation with one of the world’s most influential businessmen, the young man became distraught and distracted by how his own body could issue forth what seemed like a bucket of sweat instantaneously.  As the elevator bell dinged their arrival on the first floor, the young man suddenly stammered, “Well, I bought an iPod for my little daughter a couple of months ago.”  Smiling meekly at his quick thinking, he attempted to step towards the opening doors but was blocked by the spry Apple president.

Greatly feared throughout his Apple kingdom for his merciless, mercurial temper, Steve Jobs vibrated with anger while his face reddened to a ripe Macintosh hue.  Blood veins began to swell in his neck and forehead as if Mr. Jobs were transforming into a crimson Hulk.

Suddenly and inevitably Steve Jobs erupted, “Is that it? Is that the best thing you can come up with?”

The young man began to quickly realize that he was not handling this encounter well.  The small drop of aerosolized, Jobsian spittle landing in his right eye, blurring his vision slightly, was particularly distracting.

“Yes, I think so,” the young man embarrassingly admitted as he managed to maneuver around the increasingly irate CEO and into the lobby.

“Well, you’re fired!” Jobs shouted, halting the young man in his tracks.  Stepping out towards the young man, Jobs continued, “Go pack up all of your stuff and leave,” he said pointing towards the elevator.

“But you can’t fire me,” the young man insisted.

“Do you know who I am?  I’m Steve Jobs!  I run this company and I can fire anyone I want,” the Apple executive screamed.

“But you can’t fire me,” the young man asserted as a spirit of calmness began to fill him.

“Look, I don’t know who you are, but no one around here is too important to fire besides me,” Steve Jobs angrily asserted, “And you’re fired!”

“No, I’m not,” the young man retorted matter-of-factly.

Now only inches away from the young man’s face, Steve Jobs screamed, “And why not?”

The young man reached into his back pocket and pulled out a wallet.  Opening it, he pointed to an item held inside a clear, plastic flap.  “Because I don’t work here,” the young man stated quietly as he extracted his business card, “I was just here to fix a copier on the fourth floor.”

Jun 292010
 

According to Cuban revolutionary Fidel Castro, the United States and Israel will trigger a nuclear war before Friday that will cause the word’s richest countries to “suddenly disappear.”

Writing in his regular op-ed column “Reflections,” the former Cuban President states that missiles will fly as soon American and Israeli naval forces attempt to inspect Iranian merchant vessels.

I have absolutely no doubt that as soon as the American and Israeli warships are deployed –alongside the rest of the American military vessels positioned off the Iranian coasts– and they try to inspect the first merchant ship from that country, there will be a massive launching of missiles in both directions. At that moment exactly the terrible war will begin. It’s not possible to estimate how many vessels will be sunk or from what country.

The iconic Communist believes this conflagration will occur on or before July 2.

Obama has committed to attend the quarterfinals match on July 2, if his country’s team makes it to that stage. He supposedly knows better than anyone that the quarterfinals will not be contested because very serious developments will take place before that; or at least he should know.

Castro writes that the ensuing nuclear war might escalate to include Russia.

Nevertheless, there are still some uncertainties. Will the two mightiest nuclear powers, the United States and Russia, be able to refrain from using their nuclear weapons against each other?

There is no doubt, however, that from Europe the nuclear weapons of Great Britain and France, allied with the United States and Israel, –the same that enthusiastically imposed the resolution that will inevitably unleash the war, which for the abovementioned [sic] reasons will immediately become nuclear– are threatening the Russian territory even though this country and China have done everything within their capabilities to prevent the conflict.

Castro, the current First Secretary of the Communist Party of Cuba, describes a grim post-war world that seems to involve a global government similar to the one written about by R.C. Christian as we discussed in our Georgia Guidestones research.

It is possible to predict what will happen in the rest of the Portuguese and Spanish speaking Americas during the nuclear post crisis.

Under such circumstances, it will not be possible to talk of capitalism or socialism. A stage will open that will see the management of the available goods and services in this part of the continent.

Certainly, every country will continue being ruled by those who head the governments today, some very close to socialism and others euphoric over the opening of the world market to fuels, uranium, copper, lithium, aluminum, iron and other metals being sent to the developed and rich countries today that will suddenly disappear.

An abundance of food exported now to that world market will also disappear abruptly.

In these circumstances, the most basic products needed for life: food, water, fuels, and the resources found in the hemisphere south of the United States will suffice to preserve some of the civilization whose unbridled advance has led humanity into such a disaster.

America’s fate is perhaps most grave according to Castro.

The economy of the superpower will fall to pieces like a house of cards. The American society is the least prepared to endure a catastrophe like the one the empire has created in the same territory where it started.

Fidel Castro’s predictions are made more unsettling in light of the discoveries from our Georgia Guidestones research which strongly suggest 2010 will be a pivotal year for the cult behind that monument. Our research shows that this cult successfully completed their modern Tower of Babel, the Burj Khalifa, early this year. For this sinister cabal, the completion of the Burj Khalifa hearkened in their New Age where they believe man can now undergo apotheosis — for this small collection of powerful lunatics, they believe their elect can now become like God.

Their immediate plans appear to be:

  • Dramatically reduce the world’s population.
  • Introduce their messiah.
  • Establish a totalitarian global government, an abominable political creation they call a “New Rational World Order.”

Let’s pray Castro is wrong.  But if he is right, we know who is pulling the strings to Armageddon.

Jun 272010
 

A sure sign that a company is on its way out is when it starts needlessly defeaturing its products to create artificial market segments rather than innovating new features to add value.  Windows 7 Starter is a good example of this sad phenomena.

Microsoft originally planned to impose a three application limit to Windows 7 Starter so that no more than three applications could be run at once.  Of course, this outrageous, artificial and completely unjustified limitation would have actually cost Microsoft time and money to implement.  With the exception of a handful of confused apologists, the three app limitation earned the Redmond software giant widespread derision.  Eventually, public scorn caused Microsoft to drop this bone-headed idea before releasing Windows 7 Starter edition last fall.

However, there are other stupid and disingenuous ways Microsoft castrated Windows 7 Starter.  Not only is there an artificially imposed 2GB memory limit and the fantabulous new snipping tool is gone, but Microsoft stripped Internet Connection Sharing (ICS) from Win7 Starter.  Of course, there are absolutely no technical reasons for killing ICS, a feature that for many years has enabled users to easily set up Windows systems to serve the Internet to home networks.

The Redmond software beast wants you to fork over your hard earned dough through “Windows 7 Anytime Upgrade” to buy back ICS, a particularly vital feature for netbooks that come with integrated broadband cellular modems.  Worse still, netbooks are particularly well-suited for home servers since they use very little power and have a built-in UPS.  So killing ICS from Win7 Starter was a particularly ungreen move for the spawn of Bill Gates.

Well, it’s very easy to overcome all of the limitations your Microsoft overlord imposes.  You’ll need to download Jolicould Linux here.  A good application to burn the Jolicloud installation image to disk is ISO Recorder which you can download here.   If you don’t have a USB CD-ROM or DVD-ROM drive, you can create a bootable USB key drive by following the instructions here.  You can even install Jolicloud from within Windows if you download Jolicloud Express from here.  Once you’ve created your boot disk/USB key, boot from it.  You can install Jolicloud so that you can chose between Win7 Starter and Jolicloud at boot time, or you can completely expunge Win7 and replace it with Jolicloud.

Boot into Jolicloud and connect your netbook to the Internet.  An added benefit Jolicould brings are preinstalled broadband cellular modem drivers along with proper settings for many carriers.  When Jolicloud detects a new broadband cellular modem, the Network Manager menu, activated by clicking on the appropriate Gnome Panel icon in the top of the screen, will list a new broadband device.  Clicking on that menu entry will bring up a simple wizard so that you can select your carrier and ensure that the correct number is dialed.  It literally takes about ten seconds to to set up a new cellular modem connection in Jolicloud Linux.

To share your Internet connection, whether cellular or otherwise, right-click on the same Network Manager icon and select “Edit Connections…”.  Click the “Add” button no either the Wired or Wireless tab, depending on which way you plan to share your Internet connection.  Give the new connection a descriptive name like “Shared Internet Connection”.  On the IPv4 tab, select “Shared to other computers” as the Method.  Click “Apply”.

Reboot your netbook.  After you sign in, activate the Internet connection in the Network Manager menu if it is not automatically activated.  It might also be necessary to manually activate your “Shared Internet Connection” by clicking on the corresponding Network Manager menu entry.

You should now be actively sharing your Internet connection with your home network.

It’s humorous to note that Microsoft did a predictably sloppy job disabling ICS in Windows 7 Starter.  In fact, it is still available, but only if you want to share your active Internet connection over an ad-hoc wireless network.  In other words, other computers will have to connect to your netbook wirelessly to see the Internet.  To set up this type of Internet connection sharing configuration, simply type “adhoc” in the Windows 7 Start menu search box.  This will filter down to wizard that enables you to set up an ad hoc ICS network.

Adding MintMenu to Ubuntu

 Tutorials  Comments Off on Adding MintMenu to Ubuntu
Jun 242010
 

Mint Linux has one of the best main menus of any Linux distribution.  Microsoft Vista and Windows 7 both have Start menus that appear to have been influenced by MintMenu, the package name for the Mint main menu.  MintMenu itself is a fork of Slab, the SUSE main menu for Gnome.

Mint is based upon Ubuntu and Web Upd8 has made it is very easy to add MintMenu to that popular distro (versions 9.10 and newer).  From a terminal, first add the new repository:

sudo add-apt-repository ppa:webupd8team/mintmenu && sudo apt-get update

Then install the package:

sudo apt-get install mintmenu

To activate the menu, right-click on a Gnome Panel, choose “Add to Panel…” and select “MintMenu”.

Jun 112010
 

At least 16 people perished during extraordinary flash floods at the Albert Pike Recreational Area campgrounds about 25 miles from our home.  Television station KTHV reported that the Little Missouri River rapidly rose from 3 feet to 23 feet from about 1AM to 5AM this morning.

We frequently visit Albert Pike because it is beautiful, so I am very familiar with the area.  At 23 feet, most of the campgrounds and roads would be covered by around 15-feet of water.  It would have been nearly impossible to flee.

Reports that there could have been up to 300 people at the campgrounds are hard to believe, although the park does get busy during holidays.  I would estimate that there might have been at the most 100-150 people  in the area last night.  Nearly all of the campgrounds would have been under water at one point.  If there is any cell phone coverage in the campground, I have not encountered it.  The cabins in the area are located significantly higher above the river than the campgrounds.  The main campgrounds are located next to the river with both sides of the valley very steep and rocky.  The only real option is to travel in either direction of the river.

As regular readers of this site already know, Albert Pike is one of the most important figures in the history of Freemasonry.  The recreational area is named after Pike because he had a mansion nearby that was eventually burned to the ground, purportedly by people who where trying to rob him.  In a macabre coincidence, a packed Masonic lodge in nearby Mena was leveled by a tornado a little over a year ago, killing at least one and wounding many more.

Jun 102010
 

Dear Kathy,

Thanks for putting up with my shenanigans for fifteen years and keeping your faith in me.  And thank you for being such a wonderful mother to our five beautiful children.

Happy 15th Anniversary, Sweetheart!  I hope I’ve brought you at least a small fraction of the happiness that you have given me.

I love you and I need you,

Van

Israel kills ‘at least ten’ humanitarian activists and injures scores in attack on Gaza aid flotilla

 News  Comments Off on Israel kills ‘at least ten’ humanitarian activists and injures scores in attack on Gaza aid flotilla
May 312010
 

The Israel Navy opened fire on an unarmed, six-ship aid flotilla headed for Gaza.  The flotilla is carrying 10,000 tons of humanitarian aid and supplies to the Gaza strip.  Israel and Egypt have been enforcing a blockade of the seaside area for nearly three years, provoking widespread criticism for the ensuing humanitarian crisis.  Various reports put the number killed from the Israeli attack between two and ten. Scores were injured.  Israel attacked the flotilla, loaded with medicine, food and supplies, in international waters about 40 miles from the Gaza coast.

The flotilla carried roughly 700 humanitarian activists including several European government officials, an elderly Holocaust survivor and Mairead Corrigan Maguire, the 1976 Nobel Peace Prize winner from North Ireland.  By violently attacking the peaceful collection of activists who hailed from many different countries all over the world, Israel risks provoking a major international backlash against them.

Oddly, CNN has still not reported about this extremely important incident, one that could set in motion a major war.