Weekly Photo Challenge: Dance

Although experts and purists might object to this statement, I believe that there has always been “dancing” of one kind or another, mostly spontaneous, at the family’s annual gatherings.  Perpetrators of what some may consider to be crimes against the art of dancing shall remain unidentified.  (I am always happy to remove a picture or two if you see yourself and object.)

You can have fun coming up with captions for these pictures.  For example, the first picture could be called The Coffee Cup dance.

IMG_0118

IMG_0123

IMG_3585

IMG_3588

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

Here are more submissions to this week’s challenge.

CRISPR

How many of you have heard of CRISPR?   I gather from the Wikipedia article that it somehow holds the key to a gene editing technology that is relatively simple to implement compared to  older methods in this field.  Pioneers in this area of science include Jennifer Doudna and Emmanuelle Charpentier.   This is mind-blowing stuff with many practical applications.   You can develop approaches to tackling diseases by modifying the DNA itself.  (Think of approaches to attacking cancer in the most efficient manner without having any of the current side-effects of such treatment.) You can easily modify the DNA of pests such as mosquitoes that spread diseases as a form of pest control.  You can easily modify the DNA of plants so that they are more useful to humans. You can easily modify the properties of microorganisms so that they are less dangerous to humans, and perhaps even do useful things for them.  The possibilities are endless, and therein lies the problem.

It is a fact that we human beings have played a very significant part in determining the nature of the lifeforms that exist on this planet today.  As a process of evolution, human beings have changed over the centuries, and we have also managed to impact a lot of the things around us that we find in “nature”.  If you think that all the meats and the fruits and vegetables that we buy in the grocery store are all “natural”, think again.  They have all taken the form they are today only because we as humans have managed to affect changes to the lifeforms that are the basis of our foods in a certain way to our benefit.  We have dominated the environment of our planet in this context.  In addition to the evolutionary changes that we have caused (sped up through the process of efficient “farming”), we have also been affecting faster and more deliberate genetic changes through science in the last century or so.  While we may not have looked at what we were doing with that perspective, we have always been playing God.  And while all of this is happening, there is this moment every once in a while when we momentarily pause to consider the ethical impact of what we are doing.

The pace is now about to pick up significantly!  With simpler technology for gene editing, we have the capability to move forward much faster.  Not only that, we have the ability to open up newer frontiers in science, and with that raise a bunch of new ethical questions.

Medicine has always been about trying to take care of the problems of human beings at all stages of life and very often regardless of the costs involved.  We have been successful in extending human life significantly (for what reason, one is not always sure).  We are all about trying to make sure that people are healthy and that we overcome any health issue with all the resources available.  With the new gene repair technology, having access to all of this can become only a matter of cost.  There are of course always ethical questions involved when cost enters the picture.

But the more intriguing ethical dilemma to me will be about the process of creating a life.  It seems that not only will will be able to fix problems after birth, but we may even be able to address them before we are born.  Wow!  For example, if there is a risk of Down’s syndrome in a baby, perhaps we can now do something about it very easily before the baby is born!  Now, we are really playing God.

I suspect that some people are going to be appalled by the ethical questions that are raised, as if we are crossing some barrier that must not be breached.  But truth we told, we have always been playing God, and we have always been willing to accept any science and technology that we feel is to our benefit.  Only now the pace of “progress” increases, and this progress continues relentlessly.  It is all a continuum and the barriers that are only in our minds will be hurdled over before too long.   Where we are headed, nobody really knows.  This process started a long time ago.

The really crazy thing about all of this is even as science and technology leads us fearlessly across new frontiers, we are still unable to address some other basic requirements for humanity to thrive.  We still have inequality in the world. We still have poverty and hunger.  Crazy!

Weekly Photo Challenge: Harmony

Considering that I sing in an acappella chorus in a chapter of the Barbershop Harmony Society, this should be an ideal topic for me to address if there were no pictures involved!

I could also talk about my attempts to achieve harmony with nature through my outdoor activities, but I have already done that too many times already!

So, this time I have decided to take a different perspective.  I have some pictures that attempt to demonstrate some examples of what I think is a visual harmony of some sort, sometimes achieved somewhat unintentionally, between something natural and something created by human beings.  Hopefully I do not have to say anything more.

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

IMG_5033

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

OLYMPUS DIGITAL CAMERA

Here are more submissions for the the challenge.

Cryptography Pioneers Receive ACM A.M. Turing Award

Modern day cryptography involves some absolutely fascinating math, some of which I have been fortunate to have been exposed to while working in the field of digital video broadcast systems.  The requirement that calls for the use of cryptography in video distribution is protection the content from pirates attempting to steal the video content.  At the most fundamental level,  the audio/video data that is transmitted is encrypted so that it is not in the clear for anybody and everybody to pick up.  One has to apply the process of decryption in order to recover the original content from a data stream (or bitstream).

The nature of the encryption process determines how easy it is for somebody to break the code in order to obtain the clear version of the data that is being sent.   When symmetric block ciphers are used for encryption, you need the encryption keys to figure out how to decrypt the data.  To break the system one could try to guess at the encryption key, or try to intercept the key that is being sent to the receiver separately.  In general, the shorter the encryption key, the quicker the guessing process is. The Data Encryption Standard (DES) that was more commonly used in the past has become easily breakable with the power of computers today.  These days, the Advanced Encryption Standard (AES), with its longer block sizes and keys, is more commonly used.  AES block ciphers are hard to crack using the brute force of computers even today. If you are trying to do this in real time with a stream of data that is being transmitted, it becomes close to impossible. (People used to think that the NSA had a backdoor into the AES algorithm.  Nowadays people talk more about capability the NSA might have to break the standard using raw computer power rather than by using a backdoor.)

Protection of the content being transmitted does not depend simply on the fact that data is encrypted.  The encryption only assures that nobody can make sense of the data easily as it is being sent.  The security is actually in the knowledge of the key that is needed to decrypt the data, and most efforts to break a system focus on this aspect of the system design.   In a real system there is some form of data exchange between the source and the destination related to the key, and security is compromised if this is discovered.   In any case, when it comes to video distribution, there are many additional strategies applied along with the  data stream encryption process itself in order to protect the content.

The Turing Award is being awarded this year to Whitfield Diffie and Martin Hellman for their invention of Public-Key Cryptography and Digital Signatures.  The concept is quite brilliant!  It is based on the use of an asymmetric cipher, something quite different from the symmetric block ciphers described earlier.  When a symmetric block cipher is used, the same key is used in the processes for encryption and decryption.  With an asymmetric cipher, the key being used for encryption is different from that used for decryption.  There is a relationship between the encryption key (also called the public key) and the decryption key (also called the private key) that cannot be guessed because of the complexity of the math involved in generating the key pair.  What this allows an entity to do is then distribute a public key in the clear to everybody for use in the communications process with itself, knowing that data that is generated during the communications process using this key pair cannot be made proper sense of by any other entity without the use of the correct decryption key, something which remains private.

The algorithms used for Public-key cryptography are more complex than those used for the block ciphers in use today and are ill-suited for real-time streaming of data.  Today, public key cryptography is primarily used for digital authentication of content and the creation of digital signatures that can be used to confirm the identity of the entity that you are communicating with. In the case of video broadcasting, they generally tend to be used for protecting the keys that are used in association with the block cipher encrypted audio/video data that is transmitted.

This is a fascinating subject, but you really need to know your math to delve deeper. There is a great book, a bible if you will, on the subject of Cryptography by Bruce Schneier, that anybody who is interested in the topic should read.

 

 

Weekly Photo Challenge: State of Mind

Most photography is probably in one way or the other about trying to capture or create a  State of Mind.  Many of the submissions for this week’s challenge try to capture the photographer’s mood, or state of mind, when they were taking a picture.  I do this all the time when I am communing with nature and take pictures.  When I post such pictures I am also trying to get somebody else to feel my own state of mind.

My response to the theme takes a different direction. This posting is about pictures of people. Most often people pose for you when their picture is being taken.  The common response is to try to smile for the camera.  But sometimes, if the timing happens to be just right, I capture something unexpected.  I might have captured them in an unexpected state of mind.

OLYMPUS DIGITAL CAMERAOLYMPUS DIGITAL CAMERAOLYMPUS DIGITAL CAMERA

More often something like this happens when the person may not be aware of their picture being taken.
OLYMPUS DIGITAL CAMERA

And sometimes you can be pretty sure what their state of mind is.OLYMPUS DIGITAL CAMERA

Apple and Privacy

Privacy is something that none of us who live in the digital connected world really have.  While we would like to believe that we are safe from prying eyes by using the tools provided by the different vendors who design security solutions that incorporate into our systems, I think that this ship has sailed.  The moment you decided to be a part of the Internet, be it on the social media, or be it for simple browsing, or e-mail, or chatting, you created a door into your device, and a means for your information to become available to the snoops, and also for folks who want to misuse your device. The security solutions I mentioned before can barely keep up with the hacking world in this regard. And it only takes one mistake to open the backdoor into your system! The best you can do is try to limit the damage.

There are all kinds of snoops.  There are the ones trying to get at your confidential information to do something bad to you. There are those who are trying to misuse your personal information for other illicit purposes. There are those who are trying to legally or illegally gain some commercial advantage, trying to sell things to you by learning more about you from your computer.  And then there is the government that might suspect you of doing something illegal on your computer.

Why has it been so easy for people to get into our private systems?  For one thing, most of the systems that we work with have fundamental software design flaws that can be exploited.   Next, whenever you are connected into the Internet, you have an address at which you can be reached.  Then, for reasons of convenience, and for supporting required functionalities, systems also include means for others to get access to your working environment for legitimate purposes.  (For example, remote login capability exists for debugging purposes.)

Once you have an identity on the network, there are ways for people to try to access your system for both legitimate and nefarious purposes.  Every time you visit a website you are executing code from the website on your computer.  Websites leave cookies on your computer regularly when you browse them.  And sometimes you give outsiders access inadvertently by going to a website that interacts with your computer in a malicious manner.  Once you have have hit the wrong button on the browser screen, or in an e-mail, or even opened a malicious application file that you downloaded, you could be at the mercy of the entity on the the other side of the communication link established.

And then there are many of us who are willing to give up our privacy willingly in return for something  that we want.  It happens all the time when you give your information to companies like Facebook, or Google, or LinkedIn or Microsoft, to name a few.  It happens when you make a purchase at any online shopping  site like Amazon or even an Expedia.  And then the systems that these organizations use for storing all this information are not foolproof.  Personal information for millions of people have been stolen from the records of more than one government agency.

Your digital communications are themselves not safe from snooping.  Communications from your smart phone can be intercepted by fake cell towers, and communications through an ISP can be snooped upon directly.  Both the bad guys and the good guys take advantage of this approach.

There are rules and regulations meant to address many of the above scenarios to try to protect your privacy, but in many cases rules cannot keep up with either the technologies nor the human ingenuity when it comes to creating problems and creating chaos. Then there are the human tendencies that make us disregard the speed-bumps in the  processes that are meant to make us slow down and think for a minute.  We make mistakes that allow our privacy to be compromised. When was the last time one read a EULA?   When was the last time one read and reacted to the privacy statement (mandated by law) they received from their financial organization?  Do we accept and store all cookies offered up when browsing a website?

Tim Cook at Apple has decided that the privacy of the owner of a device must be protected at all costs.  In this case, he is talking about access to the contents of a device by a third party that has your device in their hands and wants to look into its contents without asking you.  They want to make it extremely difficult, if not impossible, to do something like this. Recently Apple introduced the concept of having all the contents of the device encrypted, and limiting access to the decryption key to the the owner of the device (i.e., even Apple does not know what it is).  In order to be able to use the key, the user has to first get access to his or her device with a password.  If somebody tries to hack the password too many times, the device stops working completely.  The system is “bricked“.  The only way to break the system is to guess the password without too many attempts.  Apple does not have a back door in its current software that lets it bypass this security.

This is where government access to a device becomes the topic of discussion.  What the FBI has asked Apple to do is to hack into their own system so that they can read the contents of another person’s smartphone.  Apple is refusing in spite of being under a court order.  They are in a difficult place. If they attempt to break their own system and are successful, it could indicate that others could also find a way to hack into their supposedly super-secure system.  They designed the system to work this way for a reason!

Is Apple justified in refusing to cooperate with the FBI?  Under ideal conditions I would say that they are not, since once you become a part of a society and its systems and use it to your benefit, you have some responsibilities to the system also.  But we also know that the system is not infallible, and can easily be manipulated and misused (as shown by Edward Snowden).   And the tendency for misuse is somehow inbuilt into the system because of human nature and can perhaps never be fixed.

Where should the line be drawn with regards to trying to protect privacy under these circumstances? It is certainly a dilemma…

 

 

Weekly Photo Challenge: Season

Unless I focus on the above topic from the perspective of the seasons in one’s life, I could end up going back to a familiar place and repeating myself in response to the weekly challenge since I have addressed the subject of the seasons in other photo challenges. (You can check our my submissions the past under the topics of Change, and also Happy Place.)

But I have no interest today in really saying anything about myself. Instead I will simply focus on this season of Winter up here in the northeast United States, and our experience of it during a walk we took last weekend on the C&O Canal towpath beside the Potomac.  We drove up to a section near Hagerstown, MD.

We ended up on a section of the trail in the area of Dam 4.
OLYMPUS DIGITAL CAMERA

The swiftly flowing river appears to be clear of ice in these parts.
OLYMPUS DIGITAL CAMERA

There is a still a layer of snow and ice on the trail.
OLYMPUS DIGITAL CAMERA

I suspect that some of the snow on the ground is from the blizzard a few weeks back.  The consistency of the white stuff has turned somewhat hard. There are larger ice crystals on the ground that catch the sunlight, and  we found that the surface was mostly capable of supporting our weight without giving in.  The traffic on the trail has been light before our arrival, and the snow has not compressed to ice (which would have made it a more slippery and dangerous path to traverse).  That having been said, it is still more difficult to walk on the snow than on the dirt.

The surface of the trail is not characterless.  There are the fallen branches that pop out of the ice.
OLYMPUS DIGITAL CAMERA

The dried leaves that have fallen on the ice can stand out.  I thought some of these even looked pretty.
OLYMPUS DIGITAL CAMERA

The leaves can even start a melting process since they seem to absorb the heat of the sun faster than the ice around them.
OLYMPUS DIGITAL CAMERA

The bladdernut pod has even created a cavity in the surface of the ice.
OLYMPUS DIGITAL CAMERA

And there is plenty of other life around.

The snow flies (are they also called stone flies?) are everywhere over the ice.
OLYMPUS DIGITAL CAMERA

There are plenty of bird sounds to be heard all around, from the cry of soaring hawks, to the loud “wuk, wuk” call of the pileated woodpecker.  There are many small birds in the bushes all around the trail.  These are difficult to spot unless one is looking carefully, but this little thrush was very cooperative.  It sat around while I took my time to change lenses to take its picture.
OLYMPUS DIGITAL CAMERA

Winter in our parts can certainly be more challenging than our other seasons, but there is still much to celebrate and enjoy if only you set you mind to it.

It is somewhat interesting to see the varied responses to this challenge.  Some of you in lower hemisphere are in the midst of summer (and a hot one in some places), while others in the northern hemisphere seem to be experiencing weather indicating that spring is on its way.  We are still in the throes of the winter season in our part of the world!