5000 pages, fully printed
Reproducing Wikipedia in a dysfunctional physical form helps to question its use as an internet resource. Articles in the book: Wikipedia’s featured articles.
Interesting list of “Magic Debug Values” from Wikipedia:
0x..FACADE: Used by a number of RTOSes
0xA5A5A5A5: Used in embedded development because the alternating bit pattern (10100101) creates an easily recognized pattern on oscilloscopes and logic analyzers.
0xABABABAB: Used by Microsoft‘s HeapAlloc() to mark “no man’s land” guard bytes after allocated heap memory
0xABADBABE: Used by Apple as the “Boot Zero Block” magic number
0xABADCAFE: A startup to this value to initialize all free memory to catch errant pointers
0xBAADF00D: Used by Microsoft‘s LocalAlloc(LMEM_FIXED) to mark uninitialised allocated heap memory
0xBADBADBADBAD: Burroughs large systems “uninitialized” memory (48-bit words)
0xBADCAB1E: Error Code returned to the Microsoft eVC debugger when connection is severed to the debugger
0xBADC0FFEE0DDF00D: Used on IBM RS/6000 64-bit systems to indicate uninitialized CPU registers
0xBADDCAFE: On Sun Microsystems‘ Solaris, marks uninitialised kernel memory (KMEM_UNINITIALIZED_PATTERN)
0xBEEFCACE: Used by Microsoft .NET as a magic number in resource files
0xC0DEDBAD: A memory leak tracking tool which it will change the MMU tables so that all references to address zero
0xCAFEBABE: Used by both Mach-O (“Fat binary” in both 68k and PowerPC) to identify object files and the Java programming language to identify .class files
0xCAFEFEED: Used by Sun Microsystems‘ Solaris debugging kernel to mark kmemfree() memory
0xCEFAEDFE: Seen in Intel Mach-O binaries on Apple Computer‘s Mac OS X platform (see
0xCCCCCCCC: Used by Microsoft‘s C++ debugging runtime library to mark uninitialised stack memory
0xCDCDCDCD: Used by Microsoft‘s C++ debugging runtime library to mark uninitialised heap memory
0xDDDDDDDD: Used by MicroQuill’s SmartHeap and Microsoft’s C++ debugging heap to mark freed heap memory
0xDEADBABE: Used at the start of Silicon Graphics‘ IRIX arena files
0xDEADBEEF: Famously used on IBM systems such as the RS/6000, also used in the original Mac OS operating systems, OPENSTEP Enterprise, and the Commodore Amiga. On Sun Microsystems‘ Solaris, marks freed kernel memory (KMEM_FREE_PATTERN)
0xDEADDEAD: A Microsoft Windows STOP Error code used when the user manually initiates the crash.
0xDEADF00D: All the newly allocated memory which is not explicitly cleared when it is munged
0xEBEBEBEB: From MicroQuill’s SmartHeap
0xFADEDEAD: Comes at the end to identify every OSA script
0xFDFDFDFD: Used by Microsoft‘s C++ debugging heap to mark “no man’s land” guard bytes before and after allocated heap memory
0xFEEDFACE: Seen in PowerPC Mach-O binaries on Apple Computer‘s Mac OS X platform. On Sun Microsystems‘ Solaris, marks the red zone (KMEM_REDZONE_PATTERN)
0xFEEEFEEE: Used by Microsoft‘s HeapFree() to mark freed heap memory
0xFEE1DEAD: Used by Linux reboot() syscall
Another shitty move by (Alcatel-)Lucent, who wrecked Bell Labs and blew all of my stock money…
Bell Labs Kills Fundamental Physics Research
By Priya Ganapati
After six Nobel Prizes, the invention of the transistor, laser and countless contributions to computer science and technology, it is the end of the road for Bell Labs’ fundamental physics research lab.
Alcatel-Lucent, the parent company of Bell Labs, is pulling out of basic science, material physics and semiconductor research and will instead be focusing on more immediately marketable areas such as networking, high-speed electronics, wireless, nanotechnology and software.
The idea is to align the research work in the Lab closer to areas that the parent company is focusing on, says Peter Benedict, spokesperson for Bell Labs and Alcatel-Lucent Ventures.
“In the new innovation model, research needs to keep addressing the need of the mother company,” he says.
That view is shortsighted and may drastically curtail the Labs’ ability to come up with truly innovative discoveries, respond critics.
“Fundamental physics is absolutely crucial to computing,” says Mike Lubell, director of public affairs for the American Physical Society. “Say in the case of integrated circuits, there were many, many small steps that occurred along the way resulting from decades worth of work in matters of physics.”
(continued at http://blog.wired.com/gadgets/2008/08/bell-labs-kills.html)
In case you weren’t previously aware, here’s a list of some of the great inventions to come out of Bell Labs in the past:
At its peak, Bell Laboratories was the premier facility of its type, developing a wide range of revolutionary technologies, including radio astronomy, the transistor, the laser, information theory, the UNIX operating system, and the C programming language. There have been six Nobel Prizes awarded for work completed at Bell Laboratories. 
- 1937 Clinton J. Davisson shared the Nobel Prize in Physics for demonstrating the wave nature of matter.
- 1956 John Bardeen, Walter H. Brattain, and William Shockley received the Nobel Prize in Physics for inventing the first transistors.
- 1977 Philip W. Anderson shared the Nobel Prize in Physics for developing an improved understanding of the electronic structure of glass and magnetic materials.
- 1978 Arno A. Penzias and Robert W. Wilson shared the Nobel Prize in Physics. Penzias and Wilson were cited for their discovery of cosmic microwave background radiation, a nearly uniform glow that fills the Universe in the microwave band of the radio spectrum.
- 1997 Steven Chu, shared the Nobel Prize in Physics for developing methods to cool and trap atoms with laser light.
- 1998 Horst Stormer, Robert Laughlin, and Daniel Tsui, were awarded the Nobel Prize in Physics for the discovery and explanation of the fractional quantum Hall effect.
Yes, that’s the transistor, the laser, UNIX, and the C programming language, let alone everything else they invented.
Thanks again, (Alcatel-)Lucent. Great job. 😦
In my continuing search for new and interesting articles due directly to my incredible fascination with North Korea (Democratic Peoples Republic of Korea), I recently found an article in Esquire about the monstrous Ryugyong Hotel, a vacant skyscraper hotel that was originally meant to be a shining symbol of the prosperity of the DPRK but has sat empty and incomplete since construction ceased in 1992 (construction began in 1987).
According to Wikipedia,
The Ryugyong Hotel (Korean: 류경호텔)(or Ryu-Gyong Hotel or Yu-Kyung Hotel) is an unfinished concrete skyscraper. It is intended for use as a hotel in Sojang-dong, in the Potong-gang District of Pyongyang, North Korea. The hotel’s name comes from one of the historic names for Pyongyang: Ryugyong, or “capital of willows.” Its 105 stories rise to a height of 330 m (1,083 ft), and it contains 360,000 m² (3.9 million square feet) of floor space, making it the most prominent feature of the city’s skyline and by far the largest structure in the country. At one time, it would have been the world’s tallest hotel. Esquire dubbed it “The Worst Building in the History of Mankind” and noted that the government of North Korea has airbrushed the building out of pictures. The Christian Science Monitor called it “one of the most expensive white elephants in history”. Over the years, the skyscraper has earned such nicknames as the “Hotel of Doom,” “Phantom Hotel,” and “Phantom Pyramid.” Construction began in 1987 and ceased in 1992, due to the government’s financial difficulties. The unfinished hotel remained untouched until April 2008, when construction resumed after being inactive 16 years.
The Esquire article has a bit more scathing review of this enormous structure:
A picture doesn’t lie — the one-hundred-and-five-story Ryugyong Hotel is hideous, dominating the Pyongyang skyline like some twisted North Korean version of Cinderella’s castle. Not that you would be able to tell from the official government photos of the North Korean capital — the hotel is such an eyesore, the Communist regime routinely covers it up, airbrushing it to make it look like it’s open — or Photoshopping or cropping it out of pictures completely.
Even by Communist standards, the 3,000-room hotel is hideously ugly, a series of three gray 328-foot long concrete wings shaped into a steep pyramid. With 75 degree sides that rise to an apex of 1,083 feet, the Hotel of Doom (also known as the Phantom Hotel and the Phantom Pyramid) isn’t the just the worst designed building in the world — it’s the worst-built building, too. In 1987, Baikdoosan Architects and Engineers put its first shovel into the ground and more than twenty years later, after North Korea poured more than two percent of its gross domestic product to building this monster, the hotel remains unoccupied, unopened, and unfinished.
But, since the Esquire article was posted, there has actually been construction activity, for the first time in 16 years!
SHENYANG, China, May 19 (Yonhap) — North Korea resumed the construction of a highrise hotel building in Pyongyang last month, which was suspended for nearly 20 years due to funding problems, informed sources here said Monday.
The construction of the luxury Ryugyong Hotel began in 1987 with French capital and technology for completion in 1992. The 105-story building has long been left uncompleted since early 1990s amid North Korea’s chronic economic problems.
“North Korean authorities restarted the construction of Ryugyong Hotel in April,” the sources said, quoting those who recently returned from trips to Pyongyang.
Orascom Telecom Holding of Egypt is North Korea’s partner for the construction, the sources said. “If completed, the hotel will be used as an accommodation for foreign investors and visitors, a business center and an international convention center among others,” a source said.
The 330-meter hotel is expected to be the world’s tallest when completed.
Now, given that the secretive country is notoriously restrictive to tourists (except during the Arirang Games), such an investment seems like an odd choice, but it looks like there’s another motive…
Traders in Shenyang, China with ties to Pyongyang say the North has now found that funding, partnering with Egypt’s Orascom Group. Orascom has publicized significant investment plans for North Korea in the last twelve months. Orascom Telecom Holding announced on January 30 of this year that it had been granted the first-ever commercial license to provide WCDMA 3G technology-based cellular service to North Korea, and put forth plans to invest 400 million USD to create a nationwide infrastructure.
This deal followed on the heals of Orascom’s first venture into DPRK investment, announced in mid July, 2007, when Orascom Construction Industries purchased a 50 percent stake in the North’s Sangwon Cement Factory near Pyongyang. This venture involved the injection of 115 million USD, which is being used to modernize the facility and increase production capacity from 2.5 million tons to 3 million tons per year.
…which is another odd move, considering that citizens in the DPRK are not allowed to own cellular phones. Or maybe they will be allowed to?
Earlier this year, the company said that it expects to sign up an initial 100,000 subscribers when it launches its new GSM network in North Korea. Speaking on a conference call, CEO Naguib Sawiris said that the service would start in three main cities in the country and the company will then pause to assess the impact.
The company aims to spend an initial US$200 million on the network over the next twelve months, with US$100 per year for the two years after that.
Whatever the case may be, this hotel fascinates the hell out of me. I’ll keep you readers posted, of course, as soon as I stumble upon more info. In the meantime, here’s a couple video “tours” of the hotel. 🙂
A model release, known in similar contexts as a liability waiver, is a legal document typically signed by the subject of a photograph granting permission to publish the photograph in one form or another. The legal rights of the signatories in reference to the material is thereafter subject to the allowances and restrictions stated in the release, and also possibly in exchange for compensation paid to the photographed.
Publishing an identifiable photo of a person without a model release signed by that person can result in civil liability for whoever publishes the photograph.
Note that the photographer is typically not the publisher of the photograph, but sells the photograph to someone else to publish. Liability rests solely with the publisher, except under special conditions. It is typical for the photographer to obtain the model release because he is merely present at the time and can get it, but also because it gives him more opportunity to sell the photograph later to a party who wishes to publish it. Unless a photo is actually published, the need (or use) of a model release is undefined. And, since some forms of publication do not require a model release (e.g., news articles), the existence (or non-existence) of a release is irrelevant.
Note that the issue of model release forms and liability waivers is a legal area related to privacy and is separate from copyright. Also, the need for model releases pertains to public use of the photos: i.e., publishing them, commercially or not. The act of taking a photo of someone in a public setting without a model release, or of viewing or non-commercially showing such a photo in private, generally does not create legal exposure, at least in the United States.
The legal issues surrounding model releases are complex and vary by jurisdiction. Although the risk to photographers is virtually nil (so long as proper disclosures of the existence of a release, and its content is made to whoever licenses the photo for publication), the business need for having releases rises substantially if the main source of income from the photographer’s work lies within industries that would require them (such as advertising). In short, photo journalists never need to obtain model releases for images they shoot for (or sell to) news or qualified editorial publications.
Photographers who also publish images need releases to protect themselves, but there is a distinction between making an image available for sale (even via a website), which is not considered publication in a form that would require a release, and the use of the same image to promote a product or service in a way that would require a release.
Regardless of legal issues, taking someone’s picture without his/her permission may be considered impolite and may provoke a hostile response, so the photographer should take such matters into consideration and ask permission if appropriate.
In reference to the last article I posted about NTFS Junction Points, here’s some more related information:
In computing, a hard link is a reference, or pointer, to physical data on a storage volume. On most file systems, all named files are hard links. The name associated with the file is simply a label that refers the operating system to the actual data. As such, more than one name can be associated with the same data. Though called by different names, any changes made will affect the actual data, regardless of how the file is called at a later time. Hard links can only refer to data that exists on the same file system.On Unix-like systems, hard links can be created with the link() system call, or the ln utility.On Microsoft Windows, hard links can be created only on NTFS volumes, either with fsutil hardlink or mklink. Also, the Cygwin set of utilities has a Unix-like ln command.The process of unlinking disassociates a name from the data
on the volume without destroying the associated data. The data is still accessible as long as at least one link that points to it still exists. When the last link is removed, the space is considered free. A process ambiguously called undeleting allows the recreation of links to data that is no longer associated with a name. However, this process is not available on all systems and is often not reliable.
An NTFS symbolic link (symlink) is a file-system object in the NTFS filesystem that points to another file system object. The object being pointed to is called the target. Symbolic links
should be transparent to users; the links appear as normal files or directories, and can be acted upon by the user or application in exactly the same manner. Symbolic links are designed to aid in migration and application compatibility with POSIX operating systems.Unlike an NTFS junction point, a symbolic link can also point to a file or remote SMB network path. Additionally, the NTFS symbolic link implementation provides full support for cross-filesystem links. However, the functionality enabling cross-host symbolic links requires that the remote system also support them, which effectively limits their support to Windows Vista and later Windows operating systems.