Jon Schull's Weblog





Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.


Wednesday, May 7, 2003
 


This from Blogroots ...

Why bloggers write so much about blogging
What was the first thing people talked about when car phones came out? ''Hey, guess where I am? I'm in the car!''. When the phones became draggable, then later portable and handheld, people's attitude towards the devices became less that of a novelty but more focusing on its utility; the social implications and so on. [...]...[
more]
posted at 7:09 AM PDT on
Anders Jacobsen's Blog

...reminds me of Loudon Wainwright's speculation about what blue whales (whose voices can travel halfway around the world under optimal conditions) could possibly saying to each other.  His speculation:  "Can you hear me now?"


comments? [] 5:55:35 PM    


Good overview of Ad Hoc Routing as applied to Neighborhood- and Metropolitan- Area Newtorks at Personaltelco's wiki http://www.personaltelco.net/index.cgi/AdhocRouting


comments? [] 5:43:47 PM    


Modular Ad Hoc Routing Algorithms Using The Click Modular Router

We've implemented several ad hoc routing algorithms using the infrastructure provided by the Click Modular Router; this project was Audun Tornquist's masters project. The primary algorithm we've concentrated on is AODV, although there are implementations of DSR and the AODV elements were also extended to support the DSDV protocol. See the masters thesis for more details.

Our goals were to build a portable, configurable implementation of different ad hoc routing algorithms. Since our implementation was entirely encoded as Click elements, we are able to execute our implementation both within the Linux kernel and as a user space process.


comments? [] 5:42:28 PM    


The purpose of LL is to setup a wireless lan infrastructure in the homes of average people that spiderwebs and interconnects coast to coast using store bought wifi equipment and not at any point connect to the real Internet. A successful test of this experiment will be to ping remote hosts the farthest that is possible.

Why ñ Imagine, more privacy, free long distance, and no charge for Internet usage - that anyone can use, managed by volunteers. Can an experiment such as this shake up the telecommunication industry any more than it already is
comments? [] 5:24:45 PM    

Hackers and Painters


I think I may have spoken to Paul Graham in when his viaweb had been online for just a few weeks, but I have just rediscovered him through a wonderful new article of his called Hackers and Painters which I recommend highly.

I still don't know whether he can hack or paint but he certainly can write.  If you promise not to let the following quotes persuade you from reading the full article, I invite you to read on.  I just think these are wonderfully written observations.

 Nothing yields meaty problems like starting with the wrong assumptions. Most of AI is an example of this rule; if you assume that knowledge can be represented as a list of predicate logic expressions whose arguments represent abstract concepts, you'll have a lot of papers to write about how to make this work. As Ricky Ricardo used to say, "Lucy, you got a lot of explaining to do."
....
If universities and research labs keep hackers from doing the kind of work they want to do, perhaps the place for them is in companies. Unfortunately, most companies won't let hackers do what they want either. Universities and research labs force hackers to be scientists, and companies force them to be engineers.
....
Big companies want to decrease the standard deviation of design outcomes because they want to avoid disasters. But when you damp oscillations, you lose the high points as well as the low. This is not a problem for big companies, because they don't win by making great products. Big companies win by sucking less than other big companies.
 
So if you can figure out a way to get in a design war with a company big enough that its software is designed by product managers, they'll never be able to keep up with you. These opportunities are not easy to find, though. It's hard to engage a big company in a design war, just as it's hard to engage an opponent inside a castle in hand to hand combat.
....
 At Viaweb I considered myself lucky if I got to hack a quarter of the time. And the things I had to do the other three quarters of the time ranged from tedious to terrifying. I have a benchmark for this, because I once had to leave a board meeting to have some cavities filled. I remember sitting back in the dentist's chair, waiting for the drill, and feeling like I was on vacation.
......
Because painters leave a trail of work behind them, you can watch them learn by doing. If you look at the work of a painter in chronological order, you'll find that each painting builds on things that have been learned in previous ones. When there's something in a painting that works very well, you can usually find version 1 of it in a smaller form in some earlier painting.
 
I think most makers work this way. Writers and architects seem to as well. Maybe it would be good for hackers to act more like painters, and regularly start over from scratch, instead of continuing to work for years on one project, and trying to incorporate all their later ideas as revisions.
....
The fact that hackers learn to hack by doing it is another sign of how different hacking is from the sciences. Scientists don't learn science by doing it, but by doing labs and problem sets. Scientists start out doing work that's perfect, in the sense that they're just trying to reproduce work someone else has already done for them. Eventually, they get to the point where they can do original work. Whereas hackers, from the start, are doing original work; it's just very bad. So hackers start original, and get good, and scientists start good, and get original.  [Actually I think this doesn't do justice to tood scientists, many of whom are makers and hackers too than they are mathematicians or engineers. --JS]
....
Another example we can take from painting is the way that paintings are created by gradual refinement. Paintings usually begin with a sketch. Gradually the details get filled in. But it is not merely a process of filling in. Sometimes the original plans turn out to be mistaken. Countless paintings, when you look at them in xrays, turn out to have limbs that have been moved or facial features that have been readjusted.
 
Here's a case where we can learn from painting. I think hacking should work this way too.
....
Great software... requires a fanatical devotion to beauty. If you look inside good software, you find that parts no one is ever supposed to see are beautiful too. I'm not claiming I write great software, but I know that when it comes to code I behave in a way that would make me eligible for prescription drugs if I approached everyday life the same way. It drives me crazy to see code that's badly indented, or that uses ugly variable names.
....
When I was a kid I was always being told to look at things from someone else's point of view. What this always meant in practice was to do what someone else wanted, instead of what I wanted. This of course gave empathy a bad name, and I made a point of not cultivating it.
 
Boy, was I wrong. It turns out that looking at things from other people's point of view is practically the secret of success. It doesn't necessarily mean being self-sacrificing. Far from it. Understanding how someone else sees things doesn't imply that you'll act in his interest; in some situations-- in war, for example-- you want to do exactly the opposite.
....
So, if hacking works like painting and writing, is it as cool? After all, you only get one life. You might as well spend it working on something great.
 
Unfortunately, the question is hard to answer. There is always a big time lag in prestige. It's like light from a distant star. Painting has prestige now because of great work people did five hundred years ago. ...What we can say with some confidence is that these are the glory days of hacking. In most fields the great work is done early on. The paintings made between 1430 and 1500 are still unsurpassed. Shakespeare appeared just as professional theater was being born, and pushed the medium so far that every playwright since has had to live in his shadow. Albrecht Durer did the same thing with engraving, and Jane Austen with the novel.
 
Over and over we see the same pattern. A new medium appears, and people are so excited about it that they explore most of its possibilities in the first couple generations. Hacking seems to be in this phase now.
 
Painting was not, in Leonardo's time, as cool as his work helped make it. How cool hacking turns out to be will depend on what we can do with this new medium. In some ways, the time lag of coolness is an advantage. When you meet someone now who is writing a compiler or hacking a Unix kernel, at least you know
I even like the footnotes:
 What you learn about programming in college is much like what you learn about books or clothes or dating: what bad taste you had in high school.
I look forward to reading Grahams other work, past and future.

comments? [] 5:16:41 PM    


Click here to visit the Radio UserLand website. © Copyright 2004 Jon Schull.
Last update: 1/21/04; 9:27:57 AM.
May 2003
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Apr   Jun