Oct 292009
 

This morning, I decided to clean my main workstation, as it’s been noisier than usual these last couple of days. Sure enough, it had plenty of dust and cat hair in it, but I also noted that a little motherboard fan was not working. I had spares, so I decided to replace it. Removing it is not easy, as it is in an awkward location, and I also had to resolder its connector onto the new fan.

That having been done, I rebooted my machine. Or, I tried to anyhow, but it failed to boot. It failed to do anything after the BIOS initialization. After a while, I realized that for some weird reason, it was trying to boot from an attached USB device. I disconnected the device, but still nothing… worse than nothing, actually, as it told me that my system disk is unbootable.

Actually, I should say disks, as I am using a dual drive mirror configuration in this computer. After poking around in it some more, I realized that I have inadvertently knocked out a cable from one of the drives. Unfortunately, reconnecting this cable didn’t help… the system was still unbootable.

And I’ve seen this before! A while back, a similar thing happened… one drive was disconnected, and when I reconnected it, the stupid RAID controller somehow managed to wipe the boot sector from both. What on Earth it did that for, I have no idea. But this is why I have a spare computer with identical drives and RAID controller… once I understood what was happening, the solution was to simply remove both drives, put them into USB cases, connect them to the other computer, and then copy over the boot sector using a raw disk editor. Easier said than done, of course, especially as I couldn’t find a raw disk editor on that spare machine (I swear I used to have one installed!) but eventually downloaded HxD, a very fine free disk editor that I have used before.

Two hours after I began, I had a working computer again. Still, it’s not a fun way to start a morning when you need both a soldering iron and a raw disk editor to get your computer working again…

 Posted by at 7:02 pm
Oct 262009
 

When will companies finally learn that Activation and copy protection do little to deter real piracy, only punish and alienate legitimate users? Here is something I just came across in a PC World blog:

“Microsoft support reps were still replying to users’ questions about product keys with a canned response citing ‘several reasons why a product key might not be accepted.’

“Essentially, either, ‘You mistyped it. The product key you typed doesn’t match the key assigned to Windows on your computer. Microsoft has identified the product key you entered as counterfeit,’ or ‘the product key has already been used on another computer,’ according to Microsoft.

“One person griped: ‘I Have been on the phone since 4 pm EST and I still don’t have a valid product code. Thank you Microsoft! Thank you for wasting my valuable time! Time is money and this had been a flagrant waste of it,’ wrote thatguy38.”

So all you’re trying to do is install legitimately purchased software, and you end up with a major headache, a useless computer, lots of wasted time, and on top of that you might get accused of theft. Talk about a strong incentive to either use cracked pirate copies or to forego using commercial software altogether, switching to open source instead.

 Posted by at 9:27 pm
Oct 082009
 

Google’s Street View has just been introduced in Canada.

Many people consider it a “gross invasion of privacy” that someone can take pictures of their streets and post it on the Internet. “What if they see my car in my driveway?” they scream at the top of their lungs, as if Google broke some long established taboo by photographing a public street.

But wait a minute… are these the same people who readily submit to having their laptops searched, its content, personal and business, examined and scrutinized, just so that customs can catch the occasional pedophile?

For what it’s worth, I couldn’t care less if Google posts photographs of my street or my house. On the other hand, I am so concerned about real invasions of my privacy, I am willing to face the wrath of customs agents by using Bruce Schneier’s method of laptop protection against unwarranted searches.

Curiously, most of the people commenting on Schneier’s article completely misunderstand his point: it’s not that I have anything illicit or shameful on my laptop that I need to hide. That would be easy. It’s that I object to the principle of strangers going through my entire life.

The really scary thing is that so many people, citizens of supposedly free countries, already adopted such a strong police state mentality: rather than looking for a lawful way to maintain their privacy, they are discussing various ways to break the law without getting caught. What I like about Schneier’s method is that it does not involve breaking the law: all my statements to customs agents would be truthful. As they say, no good deed goes unpunished… I’ll likely be harassed more than the smartalec who just creates a hidden partition on his laptop and keeps the visible partition sterile. But, at least I’ll suffer with a clean conscience, whatever good that does.

 Posted by at 12:57 pm
Sep 092009
 

Finally, an idea I’ve had years ago seems to have occurred to others, too… namely, cutting down on spam e-mail by verifying that the originating server is a valid server for the sender’s domain. The mechanism developed for this purpose is called SPF, or Sender Policy Framework. I just set up my domains with SPF records… let’s see what happens! Of course SPF is not going to do the trick until a number of major providers begin to adopt it, but the fact that gmail has done so is quite encouraging.

 Posted by at 11:50 pm
Aug 062009
 

I built myself this dual-core computer several years ago, and it has been my main workstation ever since. By and large, it’s a good and reliable machine (not counting a broken fan and some fried capacitors on its motherboard… never mind, I now have spares of the same motherboard just to be safe) but there have always been a few minor glitches.

One of those glitches concerned MIDI files… if I played back a MIDI file on this computer, its tempo was all off. That is, unless I set the processor affinity of the MIDI playback program to play back only on a specific CPU core. Go figure. If that’s the worst problem I have on a machine that otherwise runs for months without a reboot despite being used for everything from software development to video editing, I guess I can call myself lucky.

But now, years later, I ran into another curious problem. There’s this computer game from the 90s, Duke Nukem, that I, for some reason, still find quite enjoyable. I usually run it on an old Windows 98 box. Recently I found out that there is an open source effort to develop and maintain a multiplatform Duke Nukem executable. I downloaded it and tested it on a test machine… it worked fine. So the other day, I put it on my main machine. It didn’t work fine… if I hit a key on the keyboard, it registered as a large number of very rapid keystrokes to the program.

I’ve been searching for a solution and came across a comment about CPU drivers and processor affinities. Whoops! Restricting EDUKE32 to a single CPU did the trick as a workaround. And then, I remembered that two years ago, I chose not to download a processor driver update from Microsoft Update, following the good old principle of “don’t fix it if it ain’t broken”. So now I took a deep breath and downloaded this update (okay, I wasn’t too worried, since this update already ran fine on a test computer with nearly identical hardware.)

Bingo! EDUKE32 runs like a charm and guess what… so do MIDI files? A years old mystery solved. Now I can happily shoot some heavily pixelated aliens in post-apocalyptic L.A…

 Posted by at 1:49 am
Jul 292009
 

Another software product I’ll not be buying because of activation is Dragon NaturallySpeaking. I just received a promotional e-mail from TigerDirect Canada, offering this software for only CAD 59.97. Back in the old days, I’d have placed the order without much hesitation. But that was before the days of activation.

Simply put, I don’t buy software the license of which is tied to my computer hardware. My computer hardware is always changing. I have backup and test computers, and I often install software on those before risking my main computers. I only use licensed software and I abide by the terms of the license, but I do not put up with police state nonsense. Software companies do NOT have the right to police which of my computers I install their software on, so long as the spirit of the license is not violated: I am the software’s only user, and I only use one copy at a time. The purpose of test/backup installations is not to violate the terms of the license but to ensure that my ability to work remains uninterrupted by system failures or software incompatibilities.

In any case, my computer has no money. It is silly to tie a license to my computer, which has no ability to purchase anything. I, on the other hand, do have money, and I can purchase things, but why would I want to purchase things that would be tied to a computer that really is a transient entity: tomorrow, its hard drive may change, the day after, its motherboard, and so on? (The particular computer on which I am writing this text has been through many incarnations since the days when it began its existence as an Intel ‘486 machine on my then two-computer home network in the early 1990s, yet in a sense, it still has the same “identity”. Unfortunately, not quite in the sense in which computer identities are interpreted by activation software.)

Activation was supposed to boost sales by reducing software piracy. Perhaps it does that, though I remain skeptical. Meanwhile, at least in my case, I probably saved several thousand dollars over the years by no longer buying software on a whim. What can I say… their loss, my gain, I get to keep more money in my retirement account or pay off my mortgage faster.

I also note with a mild degree of amusement that cracks for most popular software are widely available on the Internet. Further, because activation and copy protection can be cumbersome, a growing number of people who purchased legitimate copies actually use cracked versions for comfort and convenience. I am guilty of doing the same: in order not to have to insert the blasted CD every time I play some particular games, I am using cracked versions instead, in which the copy protection code is bypassed. And this is when one feels compelled to ask the obvious question: if I, a legitimate purchaser, am nonetheless forced to use cracked (i.e., illegal) copies of software just so that I can use it the way I want to, what’s the point of paying for it in the first place?

This is a sad question to ask, given that I also make a living from writing software and as such, software piracy can hurt my wallet.

 Posted by at 3:13 pm
Jul 142009
 

I have to thank a fellow blogger (ouch, does that make me a blogger, too? I still can’t stand this word, but I suppose it’s now inevitably part of the English vocabulary) for an excellent post that helped me out: during the install of VISTA SP2 on my laptop, the machine failed with the error code 0xC0190001 associated with explorer.exe. The first thing I did was to try Google, and the first Google hit I found was the above-mentioned blog entry, advising me to reboot into Safe Mode, allow Windows to do its thing and reboot again, and presto: VISTA is back, with SP2 properly (I hope) installed, and I saved myself a significant amount of unpleasantness associated with a system reinstall.

Or maybe I’ll have to reinstall something in the end… because although SP2 came up just fine, for some reason I lost the Aero desktop altogether, and I am back to a standard Windows 2000 style theme, the Aero theme nowhere to be found. Curious. Good thing that laptop is not mission critical, except when I am traveling, which I am not planning to do anytime soon.

Ah. Stupid service pack upgrade disabled the Themes service. It also monkeyed with one of the VMWare services, but now that I started everything that needed starting, things seem to be working fine.

 Posted by at 7:56 pm
Jul 132009
 

I have this hard drive. Two hard drives, actually, two out of many, these two being distinguished by the fact that at one time or another, they’ve been used in my old Fujitsu laptop.

The original drive was a 40 GB drive, which I replaced with an 80 GB drive years ago. I’ve since used the 40 GB drive in an external enclosure as a backup drive. I have several other drives of varying sizes in similar/identical enclosures.

Then there is the 80 GB drive, which has been the drive in this laptop for the last couple of years. But now that I no longer use this laptop myself, I figured I’d set it up for my wife. And since she doesn’t need an 80 GB drive, and the 40 GB drive was proving to be rather small for my backup needs, I decided to swap the drives back.

But then, the 80 GB drive that I took out of the laptop refused to function properly in the external enclosure. It was recognized alright, but no data could be read off it, not even the partition table. Same behavior on several computers running different operating systems (various Windows versions and Linux.)

Oops, I said, and swapped the drives back. Lo and behold, the 80 GB drive was again working fine, inside the laptop. But when I put the 40 GB drive back into the enclosure, I was in for a surprise: it was no longer working!

What the… I swapped the drives back and forth, they were both working fine in the laptop, but not working in the enclosure. Perhaps the enclosure is faulty? A logical thought, except that when I swapped enclosures using one of my several other backup drives, the enclosure was working just fine… but neither the 40 GB nor the 80 GB drive works in any of the three enclosures that I tested them with so far. Yet they both work fine in the laptop.

I must say I am stumped. I’ve never encountered a problem like this. Why would a drive work fine in a laptop but not in an external enclosure? Why would another drive, which used to work fine in the enclosure, fail after it has been inside a laptop (with, I should hasten to add, no operating system booted, so it’s not like there was a chance for a virus to affect the drive or anything like.) Modern drives do have persistent memory, but surely there are no persistent settings that would affect a drive like this? In any case, the 40 GB drive used to live in this laptop for years, and worked fine afterwards in the enclosure for years. But now, after it has been in the laptop again, it fails in the enclosure. Why?

Weird.

And I am supposed to be an expert at this.

 Posted by at 11:22 pm
Jul 022009
 

Long before there was a commercial Internet, there were dial-up service providers, bulletin board systems, and the like. At one time, the largest among these was CompuServe, offering a comprehensive range of services including hundreds (if not thousands) of forums, online chat, downloads, and games. Indeed there was a time when no self-respecting computer company existed without a support forum on CompuServe.

I became a CompuServe subscriber in 1991 I believe. Soon after, I discovered a wonderful game hosted by CompuServe: Richard Bartle’s original Multi-User Dungeon, running under the name British Legends. Ten years ago, CompuServe discontinued British Legends using the bogus excuse that the game is not Y2K compatible; I have been running a faithfully ported version of this game on my server ever since.

But the CompuServe service remained. Under the brand name CompuServe Classic, the original service stayed in operation in all these years. Its value was greatly diminished, but it was still usable as a reliable international dial-up Internet service provider (indeed, this is the reason why I kept my CompuServe subscription active.) That is, until now.

A few months ago, they sent out an e-mail informing users that the Classic service will be discontinued on June 30.

Out of curiosity, I tried logging on to CompuServe moments ago. Yes, the old text-based services were still available until recently. But today, this is what I am greeted with:

$ telnet gateway.compuserve.com
Trying 209.154.35.102...
Connected to gateway.compuserve.com.
Escape character is '^]'.

User ID: 70674,3414

?? LOGSTU - System BHC is temporarily unavailable

Well, what can I say? So long, and thanks for all the fun.

 Posted by at 1:41 pm
Jul 022009
 

There is something positively charming about the random nature of the Internet.

I am watching a British comedy, One Foot in the Grave, on Vision TV (as to why a supposedly religious channel is broadcasting somewhat risqué British comedies in the first place, now that’s a question for another day, but I am certainly glad that they do.) At one point, the story features an old Citroen that appears in a trash dumpster in front of the protagonist’s house. The car has a license plate: MOJ459P.

On a whim, I entered this license plate number into Google. Surprisingly, there was a hit: http://www.convergence.cx/. For no discernible reason, the page features nothing else but the mushroom cloud of a nuclear explosion, and an immortal quote from Charles Babbage, pondering the sanity of members of Parliament who were wondering if his machine could give correct answers if given wrong data.

And it is a weird Web site. The page contains an invisible link to a host-side script that barfs back a series of random generated e-mail addresses. Or, I should say, almost random generated; among a bunch of bogus addresses, the e-mail addresses associated with the registration information of the IP number from which I perform the query also appear. What this means, I have no idea. The site doesn’t seem malicious, but then what is it? The top-level domain .cx is the country code for Christmas Island, but the site itself is registered as a “Convergence Organisation Object”, in London, the United Kingdom, since 2001. I have no idea what it is. Curious.

 Posted by at 1:16 am
Jun 252009
 

A few days ago, I upgraded to Skype 4.

I use Skype for overseas telephone calls a lot. I also call a few people occasionally using Skype-to-Skype. And, every once in a while, I use it to chat with people.

I have heard bad things about Skype 4 so I was not in a hurry to upgrade. But when, the other day, the software notified me that a major upgrade is available, I decided to give it a try.

Wish I didn’t.

The installation completed successfully, and Skype worked fine, but… well, it’s best if I just quote a few sentences from Skype’s own Web site where the new version was announced:

  • Skype 4.0 should certainly participate in the worst software redesign conquest.
  • Worst interface ever created for Skype and i’ve been using it ever since the 1st beta. Please dump this garbage
  • Skype 4.0 has an extreme ugly layout.
  • The UI of version 4 is a terrible disappointment. No matter how I tweak, it still consumes more screen real-estate than version 3 did.
  • Who are you people and what were you thinking when you released this kludge.
  • ABSOLUTELY TERRIBLE INTERFACE
  • Skype 4.0.x is PAINFUL and FRUSTRATING TO USE.
  • I think this is the ‘vista’ of skype releases.
  • What where you thinking. Did you guys outsource? This version has all the hallmarks of a design by committee.
  • I truly do not like the new 4.0 version! I’ve tried it for a week, hoping to get used to it, and i’m just left cursing. I am reverting because…

I share these sentiments. This morning, I gave up and downgraded to the 3.8 version. Which is working fine, as always.

 Posted by at 1:39 pm
Jun 232009
 

I’ve been using Skype since last year. Initially, I resisted, but then there were to strong reasons to use it: one, regular phone line quality has been steadily going down the drain as long distance companies increasingly began to use VoIP, and two, I was doing a bit of traveling, and Skype is a heck of a lot cheaper than hotel phones.

I’ve had Skype version 3 installed, and by and large, I was happy. I’ve been using Skype a lot to call Europe, for instance, and it worked most of the time at least as reliably as the good old phone company.

However, lately I had some call quality problems and Skype’s advice was to upgrade. So, when the other day, the software informed me that a new version is available to install, I accepted it. The new version installed just fine, and it is working fine… I can’t really tell if it actually delivers improved sound quality, but I have no reason to doubt Skype.

What the new version doesn’t deliver is an improved user interface. Simply put, the version 4 UI is not pretty. “Compact Mode” is not really compact anymore, you just get multiple windows. In regular mode, the Skype window is just huge. And, it’s ugly. For manual dial, it has an unpleasant looking, overly large dial pad. For other modes, the interface is equally unappealing, with large unused areas.

What were these people thinking? Seriously, it feels like I went back 5-10 years in time in terms of UI quality. If Skype 3 was like Windows XP, Skype 4 is more like Windows 95. I’m seriously contemplating uninstalling Skype and reinstalling version 3. I’m just not sure if it’s worth the hassle.

 Posted by at 11:23 pm
Jun 102009
 

Being self-employed means, among other things, that I am not just using my computer systems, I am also responsible for managing them.

On the second Tuesday of every month, Microsoft releases a batch of fixes. These fixes are important: they address known security issues among other things, and some of these issues may already be actively exploited by viruses or malicious Web sites. I prefer installing these updates by hand, because doing so allows me to test the updates on a test computer before putting them on “mission critical” machines. Also, my work is not interrupted by degraded system performance while an update is being processed, or by a sudden request by Windows to reboot.

A few months ago, I allowed Windows Update to install a bunch of Windows Live features on my main workstation, not because I needed them but, well, because they were available and they could do no harm, right? Well, they didn’t do any real harm, except for the annoying little issue of an Explorer window always opening up when I started the system, with the folder C:\Program Files\Microsoft, which contained just one subfolder called Search Enhancement Pack. So yesterday, since I was installing updates and rebooting the system anyway, I decided to do whatever it takes (short of reinstalling Windows, that is) to get rid of this thing.

Having done some research on Google, I decided to try a few promising-looking solutions. First, I used a command-line uninstallation command to get rid of a component called Choice Guard, which supposedly caused this folder to be opened on startup. Reboot… no cigar, the folder was still there.

One file in the folder in question was SeaPort.exe, a service component of the Search Enhancement Pack. On a hunch, I disabled this service and rebooted. Again no cigar… the folder was still there.

Then, I found the command-line command to actually uninstall the whole Search Enhancement Pack. I was sure that this would do the trick… but it didn’t. After reboot, the folder was still there.

OK, I don’t have time for this silliness, I thought, it’s time to get rid of all this Windows Live nonsense that I won’t be using much anyway. I uninstalled them all except for the Windows Live Onecare component. Reboot, and… the stupid folder was still opened by Explorer on startup.

Time to get rid of Onecare, too. I did, and rebooted… and once again, Explorer opened the folder. Mind you, by this time the folder contained only one file in a subfolder, a file called SearchHelper.dll, which many sites mistakenly identify as malicious (I believe that there is, in fact, a malicious file out there with this name, but this one is from Microsoft and not malicious. Well, not intentionally, anyhow.)

The final solution was also the lamest, something I could have done earlier had I not insisted on doing things the “right way”: I got rid of the folder in question altogether, just manually deleted it. This did the trick, but I do wonder: if for any reason, the folder is restored, would it open up again in the middle of my screen upon the next reboot? And why does Microsoft do this to us anyway?

Between this, obligatory backups, and updates to some half a dozen computers plus some virtual machines, my afternoon and most of my evening was gone.

Meanwhile, my wife received yet another spam e-mail with her own e-mail address used as the sender address. This became a new fad among spammers: why don’t we send spam pretending to be the recipient, perhaps this will trick spam filters? Well, it was time to do something about it, so I did. Unfortunately, these things can get tricky and sendmail’s configuration file, while extremely powerful, is more idiosyncratic than intuitive, with command lines like this:

R$* $| $=R $*		$@ OK

So it’s not easy to get it right (that is, filter out unwanted mail but still letting us send out e-mails with our own sender addresses) and I had to be careful not to disable legitimate mail service by accident. Eventually, since it was well past midnight already, I decided that I was too tired to do such delicate surgery, and I only finished it this morning.

Finally, I can now get back to doing something useful on these stupid computers. About bleeping time!

 Posted by at 11:58 am
May 312009
 

I’ve been learning a lot about Web development these days: Dojo and Ajax, in particular. It’s incredible what you can do in Javascript nowadays, sophisticated desktop applications running inside a Web browser. I am spending a lot of time building a complex prototype application that has many features associated with desktop programs, including graphics, pop-up dialogs, menus, and more.

I’ve also been learning a lot about the intricacies Brans-Dicke gravity and about the parameterized post-Newtonian (PPN) formalism. Brans-Dicke theory is perhaps the simplest modified gravity theory that there is, and I have to explain to someone why the gravity theory that I spend time working on doesn’t quite behave like Brans-Dicke theory. In the process, I find out things about Brans-Dicke theory that I never knew.

And, I’ve also been doing a fair bit of SCPI programming this month. SCPI is a standardized way for computers to talk to measurement instrumentation, and an old program I wrote used to use a non-standard way… not anymore.

Meanwhile, in all the spare time that I’ve left, I’ve been learning Brook+, a supercomputer programming language based on C… that is because my new test machine is a supercomputer, sort of, with its graphics card that doubles as a numeric vector processor capable in theory of up to a trillion single precision floating point instructions per second… and nearly as many in practice, in the test programs that I threw at it.

I’m also learning a little more about the infamous cosmological constant problem (why is the cosmological constant at least over 50 orders magnitude too small but not exactly zero?) and about quantum gravity.

As I said in the subject… busy days. Much more fun though than following the news. Still, I did catch in the news that Susan Boyle lost in Britains Got Talent… only because an amazing dance group won:

 Posted by at 3:07 am
May 232009
 

Ever since I installed a Microsoft update, not sure which one, whenever I reboot my computer, XP starts up opening a folder, notably C:\Program Files\Microsoft\.

Since I don’t reboot my computer that often, it’s only a minor annoyance, but I’ve learned long ago that minor annoyances can be symptoms of bigger problems, so I wanted to get to the bottom of it.

After some Googling, I took a closer look at my startup configuration using msconfig and the Registry editor, until I found that the default value under HKCU\Software\Microsoft\Windows\CurrentVersion\Run was not absent, as it should be, but rather, it was set to an empty string. Could that be the cause? I’ll know after the next reboot…

 Posted by at 12:43 pm
May 212009
 

And you wonder that people distrust lawyers.

I installed a fresh copy of the Adobe Reader on a test computer. It has a feature called “Create Adobe PDF using Acrobat.com…”, which I clicked on, out of curiosity. Up pops a dialog called “Adobe AIR License Agreement”:

Adobe AIR license agreement

Adobe AIR license agreement

The text seemed a bit long. I decided to copy it and paste it into another application, for better viewing. To their credit, they allowed me to copy. But, absent a Select All command, it was a tad hard to copy everything. Nonetheless, I managed. I was confronted by a huge bulk of text with no line breaks at all in Windows Notepad. I inserted some line breaks. The result is a 6-page legal agreement that, for all I know, obliges me to sell of all my future children and descendants to Adobe.

For what it’s worth, this is the small print they wanted me to agree to. For now, I clicked Quit as I had not the time to read it all:


ADOBE SYSTEMS INCORPORATED


Warranty Disclaimer and Software License Agreement.


THIS DOCUMENT INCLUDES WARRANTY INFORMATION (PART I) AND A LICENSE AGREEMENT GOVERNING THE USE OF ADOBE SOFTWARE (PART II).
PART I. WARRANTY DISCLAIMER.
THE SOFTWARE AND OTHER INFORMATION IS DELIVERED TO YOU “AS IS” AND WITH ALL FAULTS. ADOBE AND ITS SUPPLIERS AND CERTIFICATE AUTHORITIES DO NOT AND CANNOT WARRANT THE PERFORMANCE OR RESULTS YOU MAY OBTAIN BY USING THE SOFTWARE, CERTIFICATE AUTHORITY SERVICES OR OTHER THIRD PARTY OFFERINGS. EXCEPT TO THE EXTENT ANY WARRANTY, CONDITION, REPRESENTATION OR TERM CANNOT OR MAY NOT BE EXCLUDED OR LIMITED BY LAW APPLICABLE TO YOU IN YOUR JURISDICTION, ADOBE AND ITS SUPPLIERS AND CERTIFICATE AUTHORITIES MAKE NO WARRANTIES CONDITIONS, REPRESENTATIONS, OR TERMS (EXPRESS OR IMPLIED WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING WITHOUT LIMITATION NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, INTEGRATION, SATISFACTORY QUALITY, OR FITNESS FOR ANY PARTICULAR PURPOSE.
PART II. SOFTWARE LICENSE AGREEMENT.
BY USING, COPYING OR DISTRIBUTING ALL OR ANY PORTION OF THE ADOBE SOFTWARE, YOU ACCEPT ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT, INCLUDING, IN PARTICULAR, THE PROVISIONS ON: USE CONTAINED IN SECTION 2; TRANSFERABILITY IN SECTION 4; CONNECTIVITY AND PRIVACY IN SECTION 6; WARRANTY IN SECTION 9 AND LIABILITY IN SECTIONS 10 AND 16. UPON ACCEPTANCE, THIS AGREEMENT IS ENFORCEABLE AGAINST YOU AND ANY ENTITY THAT OBTAINED THE SOFTWARE AND ON WHOSE BEHALF IT IS USED. IF YOU DO NOT AGREE, DO NOT USE THE SOFTWARE.
ADOBE PERMITS YOU TO USE THE SOFTWARE ONLY IN ACCORDANCE WITH THE TERMS OF THIS AGREEMENT. USE OF SOME THIRD PARTY MATERIALS INCLUDED IN THE SOFTWARE MAY BE SUBJECT TO OTHER TERMS AND CONDITIONS TYPICALLY FOUND IN A SEPARATE LICENSE AGREEMENT, A “READ ME” FILE LOCATED NEAR SUCH MATERIALS OR IN THE “THIRD PARTY SOFTWARE NOTICES AND/OR ADDITIONAL TERMS AND CONDITIONS” FOUND AT http://www.adobe.com/go/thirdparty .


1. Definitions.
“Adobe” means Adobe Systems Incorporated, a Delaware corporation, 345 Park Avenue, San Jose, California 95110, if subsection 12(a) of this agreement applies; otherwise it means Adobe Systems Software Ireland Limited, Unit 3100, Lake Drive, City West Campus, Saggart D24, Republic of Ireland, a company organized under the laws of Ireland and an affiliate and licensee of Adobe Systems Incorporated. “Computer” means a virtual or physical personal electronic device that accepts information in digital or similar form and manipulates it for a specific result based on a sequence of instructions. “Software” means (a) all of the contents of the files (delivered electronically or on physical media), or disk(s) or other media with which this agreement is provided, which may include (i) Adobe or third party computer information or software, including Adobe Reader® (“Adobe Reader”), Adobe® AIR™ (“Adobe AIR”), Adobe Flash® Player, Shockwave® Player and Authorware® Player (collectively, Adobe AIR and the Flash, Shockwave and Authorware players are the “Adobe Runtimes”); (ii) related explanatory written materials or files (“Documentation”); and (iii) fonts; and (b) upgrades, modified versions, updates, additions, and copies of the foregoing, provided to you by Adobe at any time (collectively, “Updates”). “Use” means to access, install, download, copy, or otherwise benefit from using the functionality of the Software.


2. Software License.
If you obtained the Software from Adobe or one of its authorized licensees, and subject to your compliance with the terms of this agreement, including the restrictions in Section 3, Adobe grants to you a non-exclusive license to use the Software in the manner and for the purposes described in the Documentation as follows:


2.1 General Use. You may install and use one copy of the Software on your compatible Computer. See Section 3 for important restrictions on the use of the Software.


2.2 Server Use. This agreement does not permit you to install or use the software on a computer file server. For information on use of software on a computer file server please refer to http://www.adobe.com/go/acrobat_distribute for information about Adobe Reader; or http://www.adobe.com/go/licensing for information about the Adobe Runtimes.


2.3 Distribution. This license does not grant you the right to sublicense or distribute the Software. For information about obtaining the right to distribute the Software on tangible media or through an internal network or with your product or service please refer to http://www.adobe.com/go/acrobat_distribute for information about Adobe Reader; or http://www.adobe.com/go/licensing for information about the Adobe Runtimes.


2.4 Backup Copy. You may make one backup copy of the Software, provided your backup copy is not installed or used. You may not transfer the rights to a backup copy unless you transfer all rights in the Software as provided under Section 4.


3. Obligations and Restrictions.


3.1 Adobe Runtime Restrictions. You will not use any Adobe Runtime on any non-PC device or with any embedded or device version of any operating system. For the avoidance of doubt, and by example only, you may not use an Adobe Runtime on any (a) mobile device, set top box (STB), handheld, phone, web pad, tablet and Tablet PC (other than with Windows XP Tablet PC Edition and its successors), game console, TV, DVD player, media center (other than with Windows XP Media Center Edition and its successors), electronic billboard or other digital signage, Internet appliance or other Internet-connected device, PDA, medical device, ATM, telematic device, gaming machine, home automation system, kiosk, remote control device, or any other consumer electronics device, (b) operator-based mobile, cable, satellite, or television system or (c) other closed system device. For information on licensing Adobe Runtimes for use on such systems please visit http://www.adobe.com/go/licensing .


3.2 Adobe Reader Restrictions. Adobe Reader is licensed and distributed by Adobe for viewing, distributing and sharing PDF files.


3.2.1 Conversion Restrictions. You will not integrate or use Adobe Reader with any other software, plug-in or enhancement that uses or relies upon Adobe Reader when converting or transforming PDF files into a different format (e.g., a PDF file into a TIFF, JPEG, or SVG file).


3.2.2 Plug-in Restrictions. You will not integrate or use Adobe Reader with any plug-in software not developed in accordance with the Adobe Integration Key License Agreement.


3.2.3 Disabled Features. Adobe Reader may contain features or functionalities that are hidden or appear disabled or “grayed out” (the “Disabled Features”). Disabled Features will activate only when opening a PDF document that was created using enabling technology available only from Adobe. You will not access, or attempt to access, any Disabled Features other than through the use of such enabling technologies, nor will you rely on Adobe Reader to create a feature substantially similar to any Disabled Feature or otherwise circumvent the technology that controls activation of any such feature. For more information on disabled features, please refer to http://www.adobe.com/go/readerextensions .


3.3 Notices. Any copy of the Software that you make must contain the same copyright and other proprietary notices that appear on or in the Software.


3.4 No Modification or Reverse Engineering. You may not modify, adapt, translate or create derivative works based upon the Software. You will not reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software except to the extent you may be expressly permitted to reverse engineer or decompile under applicable law.


4. Transfer.
You may not rent, lease, sublicense, assign or transfer your rights in the Software, or authorize all or any portion of the Software to be copied onto another user’s Computer except as may be expressly permitted by this agreement. You may, however, transfer all your rights to use the Software to another person or legal entity provided that:
(a) you also transfer
(i) this agreement, and
(ii) the Software and all other software or hardware bundled or pre-installed with the Software, including all copies, updates and prior versions, to such person or entity,
(b) you retain no copies, including backups and copies stored on a Computer, and
(c) the receiving party accepts the terms and conditions of this agreement and any other terms and conditions upon which you obtained a valid license to the Software. Notwithstanding the foregoing, you may not transfer education, pre-release, or not for resale copies of the Software.


5. Intellectual Property Ownership, Reservation of Rights.
The Software and any authorized copies that you make are the intellectual property of Adobe Systems Incorporated and its suppliers. The structure, organization and code of the Software are the valuable trade secrets and confidential information of Adobe Systems Incorporated and its suppliers. The Software is protected by law, including without limitation the copyright laws of the United States and other countries, and by international treaty provisions. Except as expressly stated herein, this agreement does not grant you any intellectual property rights in the Software and all rights not expressly granted are reserved by Adobe and its suppliers.


6. Connectivity and Privacy.


6.1 Use of PDF Files. When you use the Software to open a PDF file that has been enabled to display ads through registration with the Ads for Adobe PDF service, your computer may connect to a website operated by Adobe, an advertiser, or other third party. Your Internet Protocol (IP) address is sent when this happens. The party hosting the site may use technology to send (or “serve”) advertising or other electronic content that appears in or near the opened file. The website operator may also use JavaScript, web beacons (also known as action tags or single-pixel gifs), and other technologies to increase and measure the effectiveness of advertisements and to personalize advertising content. Your communication with Adobe websites is governed by the Adobe Online Privacy Policy found at http://www.adobe.com/go/privacy . Adobe may not have access to or control over features that a third party may use, and the information practices of third party websites are not covered by the Adobe Online Privacy Policy.


6.2 Updating. You acknowledge and agree that the Software may cause your Computer to automatically connect to the Internet to check for updates that are available for automatic download to your Computer and to let Adobe know the Software is successfully installed. Only non-personal identifying information is transmitted to Adobe when this happens. Your communication with Adobe websites is governed by the Adobe Online Privacy Policy found at http://www.adobe.com/go/privacy . Please consult the Documentation for information about changing default update settings.


6.3 Settings Manager. Flash Player may cause certain user settings to be stored on your Computer as a local shared object. These settings are not associated with you, but allow you to configure certain settings within the Flash Player. You can find more information on local shared objects at http://www.adobe.com/go/flashplayer_security and more information on the Settings Manager at http://www.adobe.com/go/settingsmanager .


7. Third Party Offerings.
The Software may allow you to access and interoperate with third party websites, software applications, and data services, including rich Internet applications (“Third Party Offerings”). Your access to and use of any Third Party Offering, including any goods, services or information, is governed by the terms and conditions respecting such offerings. Third Party Offerings are not owned or provided by Adobe.


8. Digital Certificates.


8.1 Use. Adobe AIR uses digital certificates to help you identify the publisher of Adobe AIR applications created by third parties. Adobe Reader uses digital certificates to sign and validate signatures within PDF documents and to validate certified PDF documents. Your Computer may connect to the Internet at the time of validation of a digital certificate. Digital certificates are issued by third party certificate authorities, including Adobe Certified Document Services (CDS) vendors listed at http://www.adobe.com/go/partners_cds (“Certificate Authorities”), or can be self-signed.


8.2 Terms and Conditions. Purchase, use and reliance upon digital certificates is the responsibility of you and a Certificate Authority. Before you rely upon any certified document, digital signature or Certificate Authority services, you should review the applicable terms and conditions under which the relevant Certificate Authority provides services, including, for example, any subscriber agreements, relying party agreements, certificate policies and practice statements. See the links on http://www.adobe.com/go/partners_cds for information about Adobe’s CDS vendors.


8.3 Acknowledgement. You agree that
(a) a digital certificate may have been revoked prior to the time of verification, making the digital signature or certificate appear valid when in fact it is not,
(b) the security or integrity of a digital certificate may be compromised due to an act or omission by the signer of the document, the applicable Certificate Authority, or any other third party and
(c) a certificate may be a self-signed certificate not provided by a Certificate Authority. YOU ARE SOLELY RESPONSIBLE FOR DECIDING WHETHER OR NOT TO RELY ON A CERTIFICATE. UNLESS A SEPARATE WRITTEN WARRANTY IS PROVIDED TO YOU BY A CERTIFICATE AUTHORITY, YOU USE DIGITAL CERTIFICATES AT YOUR SOLE RISK.


8.4 Third Party Beneficiaries. You agree that any Certificate Authority you rely upon is a third party beneficiary of this agreement and shall have the right to enforce this agreement in its own name as if it were Adobe.


8.5 Indemnity. You agree to hold Adobe and any applicable Certificate Authority (except as expressly provided in its terms and conditions) harmless from any and all liabilities, losses, actions, damages, or claims (including all reasonable expenses, costs, and attorneys fees) arising out of or relating to any use of, or reliance on, any service of such authority, including, without limitation
(a) reliance on an expired or revoked certificate,
(b) improper verification of a certificate,
(c) use of a certificate other than as permitted by any applicable terms and conditions, this agreement or applicable law;
(d) failure to exercise reasonable judgment under the circumstances in relying on issuer services or certificates or
(e) failure to perform any of the obligations as required in the terms and conditions related to the services.


9. No Warranty.
The Software is being delivered to you “AS IS” and with ALL FAULTS. ADOBE AND ITS SUPPLIERS AND CERTIFICATE AUTHORITIES DO NOT AND CANNOT WARRANT THE PERFORMANCE OR RESULTS YOU MAY OBTAIN BY USING THE SOFTWARE, CERTIFICATE AUTHORITY SERVICES OR OTHER THIRD PARTY OFFERINGS. EXCEPT TO THE EXTENT ANY WARRANTY, CONDITION, REPRESENTATION OR TERM CANNOT OR MAY NOT BE EXCLUDED OR LIMITED BY LAW APPLICABLE TO YOU IN YOUR JURISDICTION, ADOBE AND ITS SUPPLIERS AND CERTIFICATE AUTHORITIES MAKE NO WARRANTIES CONDITIONS, REPRESENTATIONS, OR TERMS (EXPRESS OR IMPLIED WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING WITHOUT LIMITATION NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, INTEGRATION, SATISFACTORY QUALITY, OR FITNESS FOR ANY PARTICULAR PURPOSE. The provisions of Section 9 and Section 10 shall survive the termination of this agreement, howsoever caused, but this shall not imply or create any continued right to use the Software after termination of this agreement.


10. Limitation of Liability.
IN NO EVENT WILL ADOBE, ITS SUPPLIERS, OR CERTIFICATE AUTHORITIES BE LIABLE TO YOU FOR ANY DAMAGES, CLAIMS OR COSTS WHATSOEVER INCLUDING ANY CONSEQUENTIAL, INDIRECT, INCIDENTAL DAMAGES, OR ANY LOST PROFITS OR LOST SAVINGS, EVEN IF AN ADOBE REPRESENTATIVE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH LOSS, DAMAGES, OR CLAIMS. THE FOREGOING LIMITATIONS AND EXCLUSIONS APPLY TO THE EXTENT PERMITTED BY APPLICABLE LAW IN YOUR JURISDICTION. ADOBE’S AGGREGATE LIABILITY AND THAT OF ITS SUPPLIERS AND CERTIFICATE AUTHORITIES UNDER OR IN CONNECTION WITH THIS AGREEMENT SHALL BE LIMITED TO THE AMOUNT PAID FOR THE SOFTWARE, IF ANY. Nothing contained in this agreement limits Adobe’s liability to you in the event of death or personal injury resulting from Adobe’s negligence or for the tort of deceit (fraud). Adobe is acting on behalf of its suppliers and Certificate Authorities for the purpose of disclaiming, excluding and/or limiting obligations, warranties and liability as provided in this agreement, but in no other respects and for no other purpose. For further information, please see the jurisdiction specific information at the end of this agreement, if any, or contact Adobe’s Customer Support Department.


11. Export Rules.
You agree that the Software will not be shipped, transferred or exported into any country or used in any manner prohibited by the United States Export Administration Act or any other export laws, restrictions or regulations (collectively the “Export Laws”). In addition, if the Software is identified as export controlled items under the Export Laws, you represent and warrant that you are not a citizen, or otherwise located within, an embargoed nation (including without limitation Iran, Syria, Sudan, Cuba, and North Korea) and that you are not otherwise prohibited under the Export Laws from receiving the Software. All rights to use the Software are granted on condition that such rights are forfeited if you fail to comply with the terms of this agreement.


12. Governing Law.
This agreement will be governed by and construed in accordance with the substantive laws in force:
(a) in the State of California, if a license to the Software is obtained when you are in the United States, Canada, or Mexico; or
(b) in Japan, if a license to the Software is obtained when you are in Japan, China, Korea, or other Southeast Asian country where all official languages are written in either an ideographic script (e.g., Hanzi, Kanji, or Hanja), and/or other script based upon or similar in structure to an ideographic script, such as Hangul or Kana; or
(c) England, if a license to the Software is obtained when you are in any other jurisdiction not described above. The respective courts of Santa Clara County, California when California law applies, Tokyo District Court in Japan, when Japanese law applies, and the competent courts of England, when the law of England applies, shall each have non-exclusive jurisdiction over all disputes relating to this agreement. This agreement will not be governed by the conflict of law rules of any jurisdiction or the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.


13. General Provisions.
If any part of this agreement is found void and unenforceable, it will not affect the validity of the balance of this agreement, which shall remain valid and enforceable according to its terms. This agreement shall not prejudice the statutory rights of any party dealing as a consumer. This agreement may only be modified by a writing signed by an authorized officer of Adobe. updates may be licensed to you by Adobe with additional or different terms. This is the entire agreement between Adobe and you relating to the Software and it supersedes any prior representations, discussions, undertakings, communications or advertising relating to the Software.


14. Notice to U.S. Government End Users.
For U.S. Government End Users, Adobe agrees to comply with all applicable equal opportunity laws including, if appropriate, the provisions of Executive Order 11246, as amended, Section 402 of the Vietnam Era Veterans Readjustment Assistance Act of 1974 (38 USC 4212), and Section 503 of the Rehabilitation Act of 1973, as amended, and the regulations at 41 CFR Parts 60-1 through 60-60, 60-250, and 60-741. The affirmative action clause and regulations contained in the preceding sentence shall be incorporated by reference in this agreement.


15. Compliance with Licenses.
If you are a business or organization, you agree that upon request from Adobe or Adobe’s authorized representative, you will, within thirty (30) days, fully document and certify that use of any and all Software at the time of the request is in conformity with your valid licenses from Adobe.


16. Specific Provisions and Exceptions.


16.1 Limitation of Liability for Users Residing in Germany and Austria.


16.1.1 If you obtained the Software in Germany or Austria, and you usually reside in such country, then Section 10 does not apply, Instead, subject to the provisions in Section 16.1.2, Adobe’s statutory liability for damages shall be limited as follows:
(i) Adobe shall be liable only up to the amount of damages as typically foreseeable at the time of entering into the license agreement in respect of damages caused by a slightly negligent breach of a material contractual obligation and
(ii) Adobe shall not be liable for damages caused by a slightly negligent breach of a non-material contractual obligation.


16.1.2 The aforesaid limitation of liability shall not apply to any mandatory statutory liability, in particular, to liability under the German Product Liability Act, liability for assuming a specific guarantee or liability for culpably caused personal injuries.
16.1.3 You are required to take all reasonable measures to avoid and reduce damages, in particular to make back-up copies of the Software and your computer data subject to the provisions of this agreement.
If you have any questions regarding this agreement or if you wish to request any information from Adobe please use the address and contact information included with this product or via the web at www.adobe.com to contact the Adobe office serving your jurisdiction
Adobe, AIR, Authorware, Flash, Reader, and Shockwave are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries.
Copyright 2006-2008 Adobe Systems Incorporated. All Rights Reserved.
Patents pending in the U.S. and/or other countries.
Reader_Player_AIR_WWEULA-en_US-20080204_1313

 Posted by at 7:17 pm
Apr 272009
 

I’ve run the first realistic tests of the kind of computation that I am planning to perform on my new machine with the GPU “supercomputer” card. Here is a “before” picture:

Self-gravitating star cluster on the CPU

Self-gravitating star cluster on the CPU

And now, the exact same program running on the GPU:

Self-gravitating star cluster on the GPU

Self-gravitating star cluster on the GPU

I’d say that’s quite an improvement. To say the least.

The calculation in this case computed the self-gravitational forces in a cluster of 10,000 stars… it seems that the GPU can perform this computation at least 20 times a second. That’s quite remarkable.

 Posted by at 6:13 pm
Apr 242009
 

I built a new computer. It is a fairly decent computer, but what makes it special is its video card: it is a card that, in addition to producing graphics, can also be used for numerical computations.

The raw speed of the card is one TFLOP. That is, one trillion (single-precision) floating-point instructions per second.

It wasn’t that long ago that not even the world’s biggest supercomputer came even close to this kind of computing power.

I wonder how many such GPU cards are presently being used in places like Iran’s or North Korea’s weapons laboratories. And it’s not like it’s easy to ban their exports to such countries… the card, while bearing the ATI/AMD logo, was nonetheless manufactured in China.

 Posted by at 11:51 am
Mar 312009
 

Folks working on quantum computers are busy trying to make sure that entangled states remain entangled, because decoherence is death for a quantum computation. But now, Gross et al. showed that too much entanglement may not be a good thing: it can result in quantum computers that offer no improvements in efficiency over conventional computers.

 Posted by at 12:04 am
Mar 282009
 

Ever since I became the unfortunate owner of a new laptop (rather nice in most respects, actually) that requires Vista, I’ve been cursing the programmers in Redmond.

One prevailing mystery was this: if my laptop is in Sleep/Hibernation for more than a few hours, why does it take literally forever for it to wake up? And why is there is constant disk activity while I wait for it to respond?

It seems that I may have found the answer. It’s the blasted Superfetch service in Vista, ostensibly designed to help speed up the launching of applications. Perhaps it does that… but on a laptop, it also does many other things, none of them pleasant. It seems that the best thing to do is to disable the Superfetch service once and for all, and call it a bad memory.

 Posted by at 11:26 am