Monday, March 14, 2011

The deconvolution expert apparently and the anthropologist apparently, where “apparent” is a positive term.

Without delving into to many details: I have spent the night preparing for my gig at the Enormous Room with Stefan Helmreich. Several years ago I made a highly crappy frequency shifter that went beyond the Nyquist limit, thus flipped. The idea was for a CD of mine, based on Ryoji Ikeda’s +/- so that I would have my remixes (private since not © cleared) but if you linearly flipped the frequency domain around 1/2 the Nyquist limit, which effectively turns the sound upside down so highs are low and lows are high—and by lows that include extremely lows (not that that is usually relevant) and the highs that are way above the threshold of hearing (say, between 16kHz and 20kHz—some MP3 algorithms even chop off at 16kHz, though not the good ones): I thought, well, I could stick Ryoji Ikeda’s originals in the very high non-audible range of the “audible” spectrum. I do things sometimes, like use a silly code or include tricks. I never do anything maliciously, unlike most people who use codes or who embed things steganographically. This was a tribute and an honesty.

The idea of it being a frequency shift rather than transposition was so the range of frequencies would remain the same. See, 10kHz to 20kHz is an octave, so is 440Hz to 880Hz (concert A4 to soprano A5). And I wanted it flipped. SPEAR is an excellent analysis program written by Michael Klingbeil; it has a flip feature, using the highest partial that remains after the McAuley Quatieri algorithm after the FFT inevitable strips some less useful frequencies, as the axis of symmetry. So I used MaxMSP’s [freqshift~] object—I am teaching MacMSP to my advanced class presently—and pushed it past the Nyquist limit so that the highest energy partials—normally the lowest frequencies—would be the highest, this most hidden and less likely to leak.

The frequency shift was simply the trick to flipping, due to the reflection of frequencies at 22.05kHz at the usual CD 44.1kHz sampling rate. I did so [biquad~] filtering of the hidden sound before it went up there, around 6kHz which is pretty pathetic. Then I chopped off some of the normal (“forward”?) sound (they for me are both forward, I’m boringly regular, though less so in some way that one might imagine). The hidden audio message was pretty ugly in sound quality, so I added a fairly naïve pitch transposition to push information downwards; thus within 6kHz for the to-be hidden message, I could, say, hold up to 12kHz of information if I transposed it down an octave. But that kind of compression loses half its information, and then some, due to mathematical noise. There are the same number of “slots” or FFT bins available for the data, no matter what you do with it except if you are very DSP-savvy, which I am not; now there is math getting it there, and math retrieving it. It is not symbolic, rather, number-crunched, hence rounding errors, ripple due to windows, etc.

That indeed is very noisy, especially on MaxMSP which doesn’t have good transposers. I sometimes put it through an [allpass~] filter to reverberate it, again naïvely so—but I didn’t care as it wasn’t a serious venture, just s silly something, actually, mainly to show my class—it by delaying certain phase-shifted frequencies. Kind of a cheat; plus I altered the signal and i/o vectors sizes, which made a huge difference. (I’ve left out many details here, for a reason; it has something to do with being mugged, and my ear being attuned to something, so I haven’t explained, say, how the filters tracked sounds, and all that; the MaxMSP patch was an application, meaning the patching information was hidden, so I couldn’t even see it, after the mugging when I lost everything, as in, everything. I’ve talked about that elsewhere. Plus I write very idiosyncratically, and despite what people think, the visual aspect is sui generis.) [I have been receiving the standard barrage of emails and texts. Probably Bacon’s first idol—associating things too readily. Anyway, when I get pissed off, I post more. They’ll teach me to swim one day, but, hee hee, I have a special skill in the swimming department! I’ll write this in my other bulletin too, I think. Really, truly, madly (actually, not), deeply, wisely, and see below about what this is really about—initials SP! ;)

I demonstrated this to my classes two-to-three years ago, part of my general practice of not keeping secrets when it came to secret things(! I’ll get the semantics correct one day), i.e., I suppose an insurance policy against being accused of hiding nefarious messages there JOKE, or being falsely identified with something JOKE. Just a stupid brag because I do feel somewhat stupid around some students at these fancy universities; rarely an event zapped. Without me feeling silly. But such zapping is harmless. I suppose. And I can assure you, I have never used it fo’ shizzle; on one piece—I shan’t elaborate, only to say I have written about it in connection to rape of all things—fairly irrelevant and I might be getting customs of other countries badly wrong here, so I take that back (epar), but that is my token to identify something—I stripped it before I gave it to the person who wanted that piece. [Re-reading, this is jumbled.]

It was not on the final version; perhaps it was on the mugged version—which was a copy of everything I have ever done—I did find back-up disks weeks later, but they replicated things on the Drobo 3.4TB system—I’ve explained the mysterious return of the cover of it, my SIM card, my laptop being returned but not my bag, and the laptop being scoured for 3 hours then after I used it a couple of times, it died. Etc. I’m kind of rushing writing this because I have the gig tonight and I am not prepared, but I think... therefore... I hate being under-prepared.

One other person was given the algorithm’s description in detail (I rambled it at a talk to No.6 club—a sort-of frat at MIT, 18 months ago—perhaps at Wellesley more recently, I forget), and I gave it to only one person. I shan’t say who that is, of course. Saying this ends friendships, and no-one has ever liked messiness regarding (especially) intellectual copyright (heck, this is exactly that, all these legal patheticnesses, what with my divorce almost two months ago, which in South Dakota means it is probably fully gone through—I am joking of course when I say that now we can testify against each other... JOKE I miss Katie NOT A JOKE a truly wonderful person—see, I said it boldly).

—or artistic. I’ve gone on about honesty elsewhere. If I were sensible I would probably write a poem about this in the style of Lewis Carroll. But a little more earnestly, since I couldn’t even dream of being as multitudinously clever as the Rev. Charles Lutwidge Dodgson. I just wrote about The Carpenter and the Walrus. Next on the agenda, The Owl and the Pussycat. I’m getting a kitty this week! I met a student’s black kitty, perhaps the softest, and friendliest/sweets little beastie I have ever met. And there is a teeny tiny fully grown black-tortie in my building! I saw her for the first time today, like a little loaf of purriness.

Anyway. I won’t elaborate. I need breakfast. Trident Bookstore’s huevos rancheros methinks. But I did find something very shocking, as if I am not reviled enough for all the shocking things I find. That is, self-reviled. That saddens me. And to be fair, I developed a new algorithm a few days ago, which I have been working on, and it is sweet. Noisy, but fabulous. It is an insurance policy on a different planet, as some would say, in the Galactic Federation. or Atlantis. Or GG Land, which is in the capital G of Greenland, like something else I’d like to point out in a future post, which is related to Algeria I think, and a park in New York. At least I can use all this craziness for my job—art stuff. Hence the relatively low salary, but “low” is not a complaint. It is a great job, and I just described why.

(I cache all interesting webpages and back them up on paranoid, oops, cautious servers. It isn’t paranoia, because I can’t experience fear. Hence Amfs’s name.) So I’ve had a busy night.

Clank clank clank whisper, this is MY SCREENPLAY!!! I will eventually write out some of the really early stuff from the green fake snakeskin book (It might have been a fake snake). I had promised not to write anymore, and just put up pictures and pieces of music, but this was kind of exceptional. It is the first time I am cross-posting a message too. Oh, and videos, like ones I will be showing tonight.

Check out my other blog for my name....

I meant Dumb Art. Not 501ster. Nor ZA 891.

#DEU

11←legs
h↓
28←16←42
[h]m←bb
cltw←gbu
za←az←map london←ml
?891

#UNS

pc.bt.pj.ig
xn.dt.hp.rf
io.

Post Cunninlingo → wilt or stick? → walter’s dick → deck of cards (rome) → 52*(cardsinadeck←card(inal)sinaddict).
Bermuda Triangle → troubled water → bridge.
ss Peter & John → our church [→parish* <→decollato→breakneck→uncle→ute*.
In Gravidenza → pregnant cow → daniuterrineau [→dani→pathelogicaliar→saytellied→ satellite* →littledog(laughed)→ dish*(ranwaythespoon).
Xanad-u/N [→ s.t.c. → satellite triangle cleric → conic section of dish → parabola → trajectory → missile* /…i’llmissUreverse→missi’ll→ …*.
Delirious Tremens → dt → daytripper → stay for a day → sta diem → stadium.
and my Head while Punting, laura? → the straw hat, noah [→boater→…| <→knowher→no”er”+| → boat*.
Reisenrad Felatio → spinning head → exorcise (linda blair) → exercise → train*.
t. s. elIOt → pre-game talk sucked → peptobismal → or tums → autumns → falls*.
GL → > 50 (years in practice)
UM → ER → EiiR → QEii → buckingham palace

dunster house

7/25 /03
propaganda/instructions/truth,  e.g.buckinghampalace,dunsterHoUse,$50,apples,glass,fabric,bodyprint,treetrimming,sidewalketc.

oops [030722-0611-030724-1643] oops-codes.rtf

Eh? Ah! This is part of the screenplay I was writing in 2003. See other parts of it in my Tumblr blog, which can be accessed from http://anonymous-infinity.com. That site was very developed once, but it is lowest priority. I think I’ll post a lot of the first installment of “Paranoia—a method of torment and mind-rape.”

That is what aspects of my blogs are called.

I caught a cherub




Images © 2010 Peter Whincop. A tiny gesture for a great time smeared into a teeny journal. I also have a new recording but I still can’t work out how to put them up on Blogspot. So it will have to be Tumblr (a gain) and MySpecious (a lass because it’s so very much been hit by the bad taste stick). I am playing at the Enormous Room in Central Square Cambridge tomorrow, and am organizing exactly what. Stefan Helmreich, professor of Anthropology, already released on Negativland’s Seeland record label, was asked by them to be a representative for SETI-X (or something, since last year I cannot figure out relationships, each for their own but cyborging together rather like some of the node-like diagrams way back in some network like posts—not the mote model below, which is more about information processing and data mining) and he contacted me as a de/convolution expert. KAUM! Anyway we will be doing a remix using the Scrambles of ERF CD that SETI-X ?found. It strikes me as an interesting-enough CD, deploying fairly evenly many standard computer music techniques plus 80s synth beats. The decoding is incomplete, as the text demonstrates, and, who knows, it might just be an enormous joke on us, or an instruction manual for being a peaceful place, or a warning of Vogon Construction of a new traffic(king) route or intersection or even just a rotary/roundabout as we say downunder.

I am not an expert at convolution! And deconvolution virtually doesn’t exist. It would be a predictive code, and sonically I can think of an example: removing reverb to give the anechoic sound. Ironically or otherwise, on this disk you would then hear the heart beat of a baby. I am just a dude who has help Stefan with other music projects, kind of injecting the abstractly abstract, very unconcrete, the antithesis of his work—he is pretty well known in some spheres as the maker of the photocopy music CD and writer about the Alien Ocean. Sounds a little like the Ron Howard movie, Cocoon. Perhaps we are distilling an intentional cauldron of water that will engulf the earth, so, run for the hills. Really. Or buy yourself an Alvin and food for five years. I can imagine the Matrix breeding chambers, or the similar thing on the Army of the Twelve Monkeys. A vault for the chosen ones, self-selected, and sometimes sought. Dead and forgotten and stupid people are left behind. I will be left behind, I hope. I feel like I’m in a movie sometimes. Perhaps an early Wenders one, any, or even Antonioni. Or Michael Powell.

Boring. I wish Blogspot played GIFs. Oh, Amf. saw the clouds above Boston being shaped, she claims, and the thin light that gets shone to see how to “write every glyph exactly” as she put it. I believe her, because some people under stand.

Saturday, March 12, 2011

Sensor Node

[Retrieved from http://en.wikipedia.org/wiki/Sensor_node on 20110312-1832.]

Sensor Node

A sensor node, also known as a mote (chiefly in North America), is a node in a wireless sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network.


History

Although wireless sensor nodes have existed for decades and used for applications as diverse as earthquake measurements to warfare, the modern development of small sensor nodes dates back to the 1998 Smartdust project[1] and the NASA Sensor Webs Project[2] One of the objectives of the Smartdust project was to create autonomous sensing and communication within a cubic millimeter of space. Though this project ended early on, it led to many more research projects. They include major research centres in Berkeley NEST[3] and CENS[4]. The researchers involved in these projects coined the term mote to refer to a sensor node. The equivalent term in the NASA Sensor Webs Project for a physical sensor node is pod, although the sensor node in a Sensor Web can be another Sensor Web itself. Physical sensor nodes have been able to increase their capability in conjunction with Moore’s Law. The chip footprint contains more complex and lower powered microcontrollers. Thus, for the same node footprint, more silicon capability can be packed into it. Nowadays, motes focus on providing the longest wireless range (dozens of km), the lowest energy consumption (some uA) and the easiest development process for the user[5].

Components

The main components of a sensor node are a microcontroller, transceiver, external memory, power source and one or more sensors.

Controller

The controller performs tasks, processes data and controls the functionality of other components in the sensor node. While the most common controller is a microcontroller, other alternatives that can be used as a controller are: a general purpose desktop microprocessor, digital signal processors, FPGAs and ASICs. A microcontroller is often used in many embedded systems such as sensor nodes because of its low cost, flexibility to connect to other devices, ease of programming, and low power consumption. A general purpose microprocessor generally has a higher power consumption than a microcontroller, therefore it is often not considered a suitable choice for a sensor node. Digital Signal Processors may be chosen for broadband wireless communication applications, but in Wireless Sensor Networks the wireless communication is often modest: i.e., simpler, easier to process modulation and the signal processing tasks of actual sensing of data is less complicated. Therefore the advantages of DSPs are not usually of much importance to wireless sensor nodes. FPGAs can be reprogrammed and reconfigured according to requirements, but this takes more time and energy than desired.

Transceiver

Sensor nodes often make use of ISM band which gives free radio, spectrum allocation and global availability. The possible choices of wireless transmission media are Radio frequency (RF), Optical communication (Laser) and Infrared. Lasers require less energy , but need line-of-sight for communication and are sensitive to atmospheric conditions. Infrared, like lasers, needs no antenna but it is limited in its broadcasting capacity. Radio frequency based communication is the most relevant that fits most of the WSN applications. WSNs tend to use license-free communication frequencies: 173, 433, 868, and 915 MHz; and 2.4 GHz. The functionality of both transmitter and receiver are combined into a single device know as transceivers. Transceivers often lack unique identifiers. The operational states are transmit, receive, idle, and sleep. Current generation transceivers have built-in state machines that perform some operations automatically.

Most transceivers operating in idle mode have a power consumption almost equal to the power consumed in receive mode.[6] Thus, it is better to completely shutdown the transceiver rather than leave it in the idle mode when it is not transmitting or receiving. A significant amount of power is consumed when switching from sleep mode to transmit mode in order to transmit a packet.

External memory

From an energy perspective, the most relevant kinds of memory are the on-chip memory of a microcontroller and Flash memory—off-chip RAM is rarely, if ever, used. Flash memories are used due to their cost and storage capacity. Memory requirements are very much application dependent. Two categories of memory based on the purpose of storage are: user memory used for storing application related or personal data, and program memory used for programming the device. Program memory also contains identification data of the device if present.

Power source

The sensor node consumes power for sensing, communicating and data processing. More energy is required for data communication than any other process. The energy cost of transmitting 1 Kb a distance of 100 metres (330 ft) is approximately the same as that used for the execution of 3 million instructions by a 100 million instructions per second/W processor. Power is stored either in batteries or capacitors. Batteries, both rechargeable and non-rechargeable, are the main source of power supply for sensor nodes. They are also classified according to electrochemical material used for the electrodes such as NiCd (nickel-cadmium), NiZn (nickel-zinc), NiMH (nickel-metal hydride), and lithium-ion. Current sensors are able to renew their energy from solar sources, temperature differences, or vibration. Two power saving policies used are Dynamic Power Management (DPM) and Dynamic Voltage Scaling (DVS).[7] DPM conserves power by shutting down parts of the sensor node which are not currently used or active. A DVS scheme varies the power levels within the sensor node depending on the non-deterministic workload. By varying the voltage along with the frequency, it is possible to obtain quadratic reduction in power consumption.

Sensors

Sensors are hardware devices that produce a measurable response to a change in a physical condition like temperature or pressure. Sensors measure physical data of the parameter to be monitored. The continual analog signal produced by the sensors is digitized by an analog-to-digital converter and sent to controllers for further processing. A sensor node should be small in size, consume extremely low energy, operate in high volumetric densities, be autonomous and operate unattended, and be adaptive to the environment. As wireless sensor nodes are typically very small electronic devices, they can only be equipped with a limited power source of less than 0.5-2 ampere-hour and 1.2-3.7 volts.

Sensors are classified into three categories: passive, omni-directional sensors; passive, narrow-beam sensors; and active sensors. Passive sensors sense the data without actually manipulating the environment by active probing. They are self powered; that is, energy is needed only to amplify their analog signal. Active sensors actively probe the environment, for example, a sonar or radar sensor, and they require continuous energy from a power source. Narrow-beam sensors have a well-defined notion of direction of measurement, similar to a camera. Omni-directional sensors have no notion of direction involved in their measurements.

The overall theoretical work on WSNs works with passive, omni-directional sensors. Each sensor node has a certain area of coverage for which it can reliably and accurately report the particular quantity that it is observing. Several sources of power consumption in sensors are: signal sampling and conversion of physical signals to electrical ones, signal conditioning, and analog-to-digital conversion. Spatial density of sensor nodes in the field may be as high as 20 nodes per cubic meter.

See also

Mesh networking
Mobile ad hoc network (MANETS)
List of wireless sensor nodes‎

References

1. Smart Dust
2. NASA Tech Brief
3. Home
4. CENS: Center for Embedded Networked Sensing
5. “Waspmote: a modern mote”[1]
6. Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed energy conservation for ad-hoc routing,” in Proc. Mobicom, 2001, pp. 70-84
7. “Dynamic Power Management in Wireless Sensor Networks,” Amit Sinha and Anantha Chandrakasan, IEEE Design & Test of Computers, Vol. 18, No. 2, March–April 2001

{1. http://www.sensor-networks.org/index.php?page=0932832814}

Friday, March 11, 2011

And how do I keep an extraordinary log when it isn’t?


and this is my true log which i shall burst forth it is words and those words are just that not so much adjust that so that to tell this story or be part of it yet not enough so that not just the average parts density shall be flown in, you chose, directions play games, or they sweep

it is
rollingball a glass single one then spell or no spell

you are powerful but you just gave me back your match and that is how I know other parts are totally for real, and how I know that they freak shows on the wings of ducks and songs with wings

and I am burn,
flaming

so will that love

i am lying down now, dreaming or living into something. it feels lush. please let it be very real and that there be a different type of lifeTIME for those other things ONE DAY. i have tasted enough to know it is now beyond me (if it was ever within me), that PEOPLE REMEMBER THAT ONCE THEY WERE

Pied Beauty.

All things counter, original, spáre, strange;
Whatever is fickle, frecklèd (who knows how?)
With swíft, slów; sweet, sóur; adázzle, dím;
He fathers-forth whose beauty is pást change:
Práise hím.

—Gerard Manley Hopkins (1844-1889)

Sunday, March 6, 2011

Tumblr is sucking.

Don’t get me wrong, I love Tumblr. But whenever I post something that is dubious, such as having a song with the title “Peasant in the Big Sh!tty,” it will not upload, or if it is a video, it gets ornery. It has lost many a post for me in the past. I don’t let it get me down. Minus the sound file, here is the post that Tumblr is failing at right now:

[The soundfile can be played directly from http://anonymous-infinity.com/temp-music/medleymuddle.mp3.]

© 1977 The Stranglers, © 2006 Belle & Sebastian. This is just totally ridiculous, but I can occasionally hear my name in songs. Statistically that is normal of course, not meaning I’m some kind of statistic, but the way consonants form, and formant frequencies for vowels are everywhere—an orchestra of 100 detuned (retuned) electric guitars can produce in their wash of tight harmonics, too tight perhaps, accidental formants of any vowel of any voice or of any instrument. I have written about this on my http://anonymous-infinity.com website, but the link has been intentionally broken by me until I bring some ideas up-to-date.

The first example is Belle & Sebastian, “The Blues are Still Blue” (The Life Pursuit). I hear my last name (“Whincop”) sung in the main vocals, then by the backing vocals. Totally stupid of me.

The second example is twofold: the first is the live version of The Stranglers’ “Peasant in the Big Sh!tty” (Rattus Norvegicus, CD version only; it wasn’t on the original 1977 LP, and I do not know when the live recording was made), where I can very clearly hear my name, almost overdubbed, to be honest, listen, it is very odd; followed by the No More Heroes studio version, also 1977, in which my name hasn’t been “overdubbed”! Yes, silly.

But I have my ears open in a world of misplaced phonemes as my nose seemed to be in a world of overly-placed pheromones. I will try to find my soundfiles of various machines and various clanking things, which just for a few months made my name. Why not? Well, I’m always in the same place. They tried to deliver me backwards, and then they treated me as the most [regular expressions back reference] person I know. More of that paranoid malady kicking me there and here and back again, more of that psychotic backlash, I think. I’ll sign the I-94 next time and skip my green card: within a three-month waiver, goodbye to my real woe for good. Yesterday here, and a future gone today.

Oh, here’s a thought, what really does “Make my day” mean, and why? And, as they say, don’t wait for it, because it is already here. It is T. Time. Make my day, court some pride, dip in your right toe as hokey as it is, “but”s are not there to be “if”fed, a Time as good as any will be 3/14/2011 at the Enormous Room. Think about the name of that place. And why the elephant. Was B a weight off my chest in his grayness as a special chest T the color of an E? Fur shure. Just like the masters of microphony. Just like Für Elise, by Ludwig van. For release, for real ease. I am dulled; I am only part sui generis. But I only partly coincide with anyone else, ipso facto.

It’s a pity Beat Research Experimental Party Music* won’t be on the Tuesday of that week. But the difference there is one of frequency. Here is the blurb. Apparently I will be there doing something with Prof. Stefan Helmreich from MIT’s Anthropology Department, who is somehow connected to Negativland Research Label, and I have discovered that I am a “deconvolution expert” though that is fairly crap as I preach the unlikeness of deconvolution to my classes every semester and only recently on a film that Verena Paravel made, a Skype of her interviewing both Stefan and me, I explain that very fact. It may have been circumcised, as two hours of footage became 20 mins, and somehow it has become Stefan interviewing me in a film by Verena, ostensibly on “What Separates Us.” I am confused.

Well. I’d like to get my lingualobia around that title, and olfactolobia around the change of roles, which, as with rolls of films, will probably just be editing blah (I think Stefan and Verena are doing it, I wish the lusion had been an inkling and not an eyeballing or merely a clue. I wonder what the lingualobia interpretation of “deconvolution expert” (from Harvard and MIT, apparently!) is. If Beat Research had not existed longer than the last few years, I would say that...

... it is better said elsewhere, lest I court bad feelings from my friend and occasional collaborator, sgh2, as I call him. I am lucky, but not by being lucky.

I can’t stand it that my internet port monitor shows oh so very surprisingly regular attacks/seeks/even connections on my laptop, how it has no functioning airport card but still transmits, according to the monitor application—i.e., I am avoiding inventing things when saying things like this since they can be misconstrued as overly paranoid, but with log files, that is safe. Like when I was mugged, I lost my disks, all of them, a Drobo system. I lost my laptop, all my IDs including NZ passport and US green card. My SIM card for my iPhone (but not my iPhone; it was an odd thing that night that I very distinctly separated out the two). I lost a lot.

Three days later, the front panel of my Drobo appeared in my office (which has very limited access, although RFID readers can be fooled; I didn’t lose my MIT ID or my real school ID). Magic. Wow. But no Drobo itself. No disks. Just a scrap of paper indicating—which I stupidly discarded in anger—that someone has been “stealing my music”! Hence my obsession earlier in the blog. Know I know how metonymic that theft was (and it was real, losers all of them, using a file extraction technique known in forensics as disk siphoning or sucking, also thermal coupling, and in tension-bluffing some magnetic field of disk thing, attraction/repulsion, where the “pro-magnet” lies beside the passive device, well, the lying is relative to the angle of the passive device, and the activest one, not the passivest one, draws on the others (I don’t know even the basics, it can be done without me noticing, as it was over, god, I don’t know, I composed so much, the over-bit seek would have needed, including remixing data chunks, I dunno. In any case, I imagine, facing this head on, even using a two-faced twin seek-head and many write-heads, this still would have taken time, so as to identify what would be taken, or inserted, yes, inserted. I thought it was a frat prank, and if that is even remotely suggested in earlier posts, I retract those suggestions, the older frat idea is long on its way to the giant refuse tip in the sea or sky of suspicion. Apparently, just once, I might have been confident enough to assert such things, but, whatever, yeah, another whatev. Meh.

My poor iPhone, it would say, “no SIM card installed!” I could do some things in a wireless network, and write notes, etc. Then I answered a call from NZ, and we usually chat for 30 minutes or so. I hung up. Holy SIMulated exclamation, Batman! Not only had my SIM card been returned, but it had been put back in the iPhone that I had (over the week following the mugging) lost, only for a couple of hours at a time, three times—returned to my classroom each time! I was lucky.

I have only lost my iPhone one other time, $600 permanently, and I unfortunately worked out who it was months after a close friend and I lost touch, so couldn’t ask her help in the matter. Yet another phone (or telephone?) goes nowhere; I only get enraged, really angry... ugh. Over you. Every aspect resonates so awfully with this incident.

Really and truly. The Material Dialectic (Marxist term) has its way.

So my SIM card reappearing was pretty much a relief. My backpack wasn’t returned but my laptop was! (Of course the disks are history.) Someone apparently found the backpack and laptop soon after the mugging, like well under an hour, surveillance video shows. I asked for this not to be followed up on, though I did need a police report for insurance reasons. Due to the way the night unfolded, I made sure I was walking in a commercial area at 3–6a that July night in Allston (but why was I there at all? Wait for the 2hr film, which I swear I will make one day, over my dead body only will that not happen).

Banks, trucking yards, etc. (Good for the film.) But as pursued as I was, I didn’t want to pursue things except on my own. The laptop was brought to the local precinct around three hours after it was found; the backpack—bright creamsicle orange—was hung on a fence. That was somewhat a relief. Interestingly, I know that that three hour window exists. How? I checked the /var/log, and all the other logs, including those of browser caches last-access timestamps. The computer had been turned on, logged into successfully the first time (and it was off at the time, plus it is never in a state of not being password locked, e.g., by the screensaver), and absolutely rifled through, and basically copied, and many files swapped, though with unaltered timestamps. That requires some Unix know-how. But not enough not to cover tracks. Or... on purpose? Or... not the cunning control-center squad, just the hit-and-run with a little assault-and-battery squad. Battery, cell phone, get it, get it? I real funny.

So when I see connections that I have deemed somewhat safe—I have a decent firewall as well as a port/socket monitor and I never use wireless (hard to do with a broken airport card, broken only after I took it in to be fixed at a “genius bar”)—come knocking my laptop’s door. Some from within the LAN I suppose, not that I have enabled that kind of searching or permission—one can be picky on a Mac, and I was. Naturally I do not need to be worried about the Music Department’s computers actually connecting with mine, I am not sure how, but they do somehow. I am in a music department classroom. D’uh. And the liquid battery computers, and a/vcomputers, which are in the same sub-infinite corridor as me, naturally stray. Who knows where mine shows up.
I hope nowhere since under “Sharing” in my System Preferences I have nothing checked. I am unsure why, in the connections that can be made, something from Comcast in New Jersey (or nj.comcast.net) can appear.

I have run out of steam. I had so many photos to put up, and my new piano piece is begging to be written and to be distributed freely—I find it quite beautiful (can I say that?), a little disturbing, but calming; it breathes slowly and slightly. I always think I will stop this wretched blog and just post the addresses to a very odd place, let’s say Facebook and a million book and CD reviews I will spam! Get real, that’s not style. Not mine, anyway. These are linked to from my web pages—two portals I suppose aside from Tumblr and Blogspot—and actually from BeBo, and Scribd, and the rest. But I will retire soon as there are more important things to do.

I had something to say about the rebuilding of ChCh in NZ—at least the article seemed to be about that. Apparently New Zealand is, across the world, the most heavily insured nation. Insurance is not only fiscal and property. It is a very very complicated thing, and that is why actuaries spend years training after getting their very difficult math degrees. Nothing should be taken for granted; there are so many exigencies, so many possibilities. Not all bases can be covered, but it is a game theory, a game of theory. It is patience, it is time, it is past failure, it is probably future failure; it is not winning or losing; it is safeguarding exactly that which you think MUST be safeguarded, even if the flames and the thieves know the vulnerabilities. It is about others, and looking after them. It is taking care of things, it is a lifetime of good habits and planning (with glitches, yeah, they happen, hence the predicament, exploited by those very far from me. Or, actually, such people don’t know me). There are one or two extremely good policies to take out (in addition to an ongoing not-overdone “bubble”).

Not so secret, fairly mind-numbingly boring (such is insurance and my previous paragraphs), yes, ...

Someone made a mistake! Oops!—I’m saying that on their behalf. Big boo-boo. You needed to light a candle the old fashioned way, as a beacon of some kind of hope, I imagine. You couldn’t find your arsenal of things to strike. Your clip. Your magazine. Your, I forget the word for getting the kettle boiling in England, tinder? But the candle started burning (and is flickering). You met your match. Groan. Game (theory), set (theory), and

*Oh, the full Beat Research blurb:–

March 14th
SETI-X and
A Stack of Dusty Records
w/ visuals by
VJ Dziga and TDOGG

A special Beat Research session devoted to cosmic sounds, this week brings representatives of SETI-X, an exiled offshoot of the Search for Extraterrestrial Life, to present their stunning discovery: Scrambles of Earth: The Voyager Interstellar Record, as remixed by extraterrestrials. Audio and video de/convolutions of the Voyager Golden Record, launched into space in 1977.

To round things out, Tim, aka A Stack of Dusty Records, the co-owner of Mystery Train Records in Gloucester, MA, will be digging into his deep space crates and offering some thematic accompaniment, while VJ Dziga mixes and mashes rare NASA footage and other alien sights on the big screen and TDOGG explores further levels of photon manipulation.