Science and technology

Babbage

  • Digital fingerprints

    Grand anti-theft photo

    Jun 9th 2011, 18:50 by G.F. | SEATTLE

    YOUR camera is snatched. Will you ever see it again? Probably not. But it may send postcards from its new owner. The odds of recovery of lost or stolen cameras have improved as newer devices combined with online photo-sharing services create a digital spoor one can follow with the right tools.

    Dozens of cameras from major manufacturers embed the serial number found on a camera's body into its software as well. The serial number is then included in the metadata with which every picture taken by the camera is tagged. That would be of mere incidental interest, except that such data are recorded when a photo is uploaded at sites like Flickr. They can, therefore, be extracted and indexed.

    Ken Westin, whose firm makes the GadgetTrak theft-recovery applications, wondered if enough tagged photos were available to create a searchable database for cameras that had gone astray. GadgetTrak already offers similar programs for laptop, desktop and mobile devices. Few cameras allow installing third-party software, however, and only a relatively small number sport limited forms of Wi-Fi networking. But camera owners can be obsessive about uploading their photos. This provides the missing link. Once a photo is uploaded, whatever embedded data it contains (and the user or service allows to be seen) becomes globally available.

    Mr Westin partnered with CPUsage, a start-up also in Portland, which created indexing software, called a spider, to retrieve and analyse tens of millions of images on Flickr. A test version of GadgetTrak's Serial Search collected 2.5m unique serial numbers in just one week. It plans to do the same for PhotoBucket and other services. Mr Westin assures that only publicly available photos and information, of the type already indexed by search engines like Google and Bing, are being examined. Either way, he expects to top 10m in the near future. Once the database scales that threshold, the company has agreed to collate it with that of a list of missing serial numbers compiled by Oregon's police.

    GadgetTrak is not alone in this kind of effort. Programmer Matt Burns launched stolencamerafinder in 2010. His service collects data in several ways. Users of Google's Chrome browser can install a plug-in to extract and upload serial numbers found in images retrieved while surfing the web. So far, around 1,500 have done this. Mr Burns says he also consults Flickr, and intends to deploy an indexer of his own shortly, to glean serial numbers from any image on any web page. He lets other software developers consult his database at no charge. This, he hopes, will give rise to a slew of programs that the authorities and others could consult. His serial-number count trails GadgetTrak's for now. But he cheekily expects to move into poll position soon. 

    Of course, once a camera's serial number crops up, locating the device's current location need not be straightforward. If it were lost, the finder (now found by photo-sharing account) may be implored to return it. That is unlikely to work, however, if the camera was stolen. Still, posted pictures may give clues as to its whereabouts. Even more helpfully, more and more cameras now come with a GPS receiver (or link up to an external one) for inserting geographical coordinates into a picture's metadata. The Eye-Fi camera card, for instance, relies on Wi-Fi hotspots to approximate a position. (Certain versions of the card also opportunistically upload photos to any of over 100,000 Wi-Fi hot spots, too, making tracking easier.) Flickr strips out or only shows the uploading accountholder such information unless a user explicitly permits it. Photos posted in other ways, though, may leak this information more casually. With enough such clues, police could ask a photo service or obtain a warrant to retrieve location data stored in the user's account.

    Mr Westin says that photographers can examine an image taken by their camera prior to losing it and extract the serial number. He wants to release a tool to make this easier. Mr Burns's stolencamerafinder site already features a similar web application.

    All this is, of course, a double-edged sword. Any information that helps find pilfered goods may also be used to track camera owners' activities. Tools to delete such data before photos are uploaded to the internet are available. And thieves know it.

  • Babbage: June 8th 2011

    Navigating shifts

    Jun 8th 2011, 22:19 by The Economist online

    IBM turns 100, Groupon prepares to launch its IPO despite hefty losses and video game manufacturers unveil their latest products

  • Military camouflage

    That old razzle dazzle

    Jun 7th 2011, 22:19 by The Economist online

    IN THE second world war, many Allied ships were painted with dark and light stripes, and other contrasting shapes, making them look a bit like zebra. The idea was to distort an enemy submarine commander’s perception of the ship’s size, shape, range, heading and speed, so as to make it harder to hit with the non-homing torpedoes of the period. These had to be pointed not at the target directly but, rather, at the place where the commander thought the target would be when the torpedo arrived. At the time, it was only an educated guess that this so-called dazzle camouflage would work. But now someone has actually tested it and the short answer is that it does work—but not in the way that Allied navies thought it did. Ships move too slowly. Dazzle camouflage might well, however, have a role in protecting faster-moving vehicles, such as military Land Rovers.

    Nicholas Scott-Samuel, of the University of Bristol, and his colleagues came to this conclusion by asking volunteers to watch patterned rectangles cross a computer screen. Some of the rectangles had horizontal stripes inside them. Some had vertical stripes. Some had zig-zags. And some had checks. Some, acting as controls, had no internal patterns. Each test involved a jazzy rectangle crossing the screen either before or after a plain one. Volunteers had to estimate which of the two was travelling faster.

    In fact, in all cases, the two rectangles travelled at the same speed. But the researchers varied the conditions in other ways, without telling the participants. Sometimes both rectangles travelled slowly, at just over 3º of arc a second from the observer’s point of view, mimicking a ship. Sometimes they travelled much faster, at 20º a second, mimicking a land vehicle. The jazzy rectangles also differed. Some were low contrast (ie, not very jazzy) and some high contrast.

    The upshot, as Dr Scott-Samuel reports in the Public Library of Science, was that participants were not fooled by slowly moving rectangles, nor by low-contrast ones. But fast-moving, high contrast ones did fool them. On average, an observer reckoned such a fast, jazzy rectangle was going 7% slower than was actually the case.

    Ships, then, travel too slowly for dazzle camouflage to have an effect. In any case, modern torpedoes and missiles are guided to their target electronically. But 20º a second corresponds to the perceived movement of a vehicle 70 metres away that is travelling at 90km an hour. That is precisely the sort of distance from which an unguided rocket-propelled grenade might be fired at a lightly armoured military vehicle, and precisely the sort of speed such a vehicle might be travelling at. Perhaps the answer, then, is for modern armies to buy their Land Rovers second-hand from game parks, which often paint them in zebra stripes for effect. Whether real zebras are striped that way to confuse predators, has yet to be determined.

  • Internet infrastructure

    Pick a number, any number

    Jun 7th 2011, 5:35 by G.F. | SEATTLE

    THE scheme to renumber the internet's billions of connected devices will be subject to a significant test of preparedness on June 8th, dubbed World IPv6 Day. IPv6 (internet protocol version 6) will ultimately replace the current IPv4 addressing system, which has nearly run out of addresses for networks to assign to computers and other devices. A complete conversion to the new standard is still a long way off, but the test is the first step on the way. It aims to determine how well big internet firms fare when it comes to providing access to common resources using both old and new addressing conventions at once.

    IPv4 has about four billion addresses assigned in blocks of varying size. At one time, a single institution, like Stanford or Apple, might be given an allocation of 16m addresses, and use just a fraction. Others might be allowed just 254 and use one or two. To eke out more time on the IPv4 death watch, owners of idle addresses in the larger blocks had to give up unused portions. IPv6 allows for 3.4x1038 addresses which, boffins reckon, should last until the heat death of the universe. That may seem like overkill, but so did four billion-odd a few decades ago.

    The idea is for IPv4 and IPv6 to work side by side indefinitely, as hundreds of millions of pieces of older hardware, including plenty of commercial network equipment and home routers, are incompatible with IPv6. (The idea is that the internet will move from islands of IPv6 in a sea of IPv4, to islands of IPv4 in a sea of IPv6.) The test will reveal whether end users can access websites, the most common public resource on the internet, without too much hassle. But some hassle there certainly will be as operating systems, browsers, home and office broadband gateways, and the internet's backbone of high-capacity routers, all begin talking to each other in a slightly different language. The Internet Society, a think-tank and instigator of the day-long experiment, reckons about one in 1,000 users trying to reach the participating websites could experience a problem.

    The Internet Society has championed internet standards for decades, and commands attention. It has beaten the IPv6 drum ever since it became clear that four billion is not such a big number, after all, imploring companies and institutions to take the issue seriously. Some have—Mac OS X, Windows and modern mobile operating systems generally handle IPv6 with gusto—but concern about maintaining pipe pressure along the way from a user to his online destination have kept service providers from hooking up the IPv6 taps in earnest.

    To allay providers' fears, as well as their own, big content sites including Facebook, Google and Yahoo! signed on to the World IPv6 Day early. So did content-distribution networks like Akamai and Limelight. Hundreds of other sites large and small are participating, too. Hopefully, any flaws the test reveals—and there are bound to be some—will be easy enough to mend. If so, a world of IPv4 and IPv6 may be schizophrenic; but it ought to prove livable.

  • Apple

    Cloudy with a chance of music

    Jun 6th 2011, 21:04 by M.G. | SAN FRANCISCO

    COMPANIES have long been talking about the potential of cloud computing, or the notion that data can be accessed almost anywhere at anytime via company-approved devices. Now it looks like consumers, too, will soon be able to roam about while constantly connected to their own personal clouds. On June 6th Apple unveiled a cloud-based service, predictably dubbed the iCloud, that will become available in the autumn and allow users to store up to five gigabytes of content for free.

    The new service will make it possible for folk who, say, purchase music from Apple's iTunes store to then play it across multiple Apple devices, rather than just the one used to access the track in the first place. Other content such as books, software applications and documents will also become more broadly accessible, assuming users have the latest versions of Apple's operating systems on their iPhones and other Apple hardware. The iCloud will also make it easier for users to synchronise information such as online calendars, address books and e-mail across their iGadgets—a process that even Steve Jobs, Apple's famously perfectionist boss, has admitted is currently less than satisfactory using the company's paid-for MobileMe service. (Mr Jobs is still on medical leave, but made an appearance at Apple's Worldwide Developers Conference to introduce Apple's foray into cloud computing.)

    Although the iCloud will not offer music-streaming services, it represents the most ambitious attempt yet to create a broad-based consumer service that allows people to keep information and content up to date across numerous devices (up to ten on the same Apple ID). And it is bound to trigger a response from other tech firms that already have their heads in computing clouds, including Google and Amazon. Google has numerous cloud offerings such as Google Docs and Amazon offers users the ability to read electronic books on multiple devices, including its Kindle e-readers, as well as other gadgets such as the iPhone.

    Some forecasters reckon that competition will rapidly expand the market for personal cloud-based services. Forrester, a research firm, has estimated that this will be worth some $12 billion by 2016, with half of that coming from direct subscriptions from users and the rest from sources such as advertising. Hordes of start-ups such as Evernote and Dropbox have been targeting this market for some time, but will now find themselves facing competition from some of the tech industry's behemoths. At this week's meeting, Mr Jobs referred to the software behind services such as Apple's iCloud as "the soul" that complements "the brain" that is Apple's hardware. In combination, they will be tough to beat.

  • Internet insecurity

    Once more unto the breach

    Jun 3rd 2011, 11:02 by M.G. | SAN FRANCISCO

    DEFENCE companies have been left defenceless. A prominent internet giant has found itself the target of an online plot that allowed outsiders to read some of its users’ emails. And a media organisation has hit the headlines after its own website was vandalised by digital intruders. The cyber attacks against Lockheed Martin and L-3 Communications, two American defence giants, as well as those against Google and America’s Public Broadcasting System (PBS) differ in their details. But they all highlight the fact that hackers are becoming ever more tenacious and creative in their attempts to get their hands on sensitive data.

    It’s not just American firms that are under attack. On June 2nd, a group of hackers calling itself “LulzSec” claimed that it had been able to get into the network of Sony Pictures. In a statement, the group said it had accessed details of a million customer accounts, including email addresses and dates of birth. Sony’s executives are investgating the group’s claim. If it turns out to be true, it will be a huge embarrassment for the company, which is only just recovering from another recent attack that forced it to shutter its high-profile PlayStation network for several weeks, costing it millions of dollars.

    LulzSec (which also uses the moniker “The Lulz Boat”) claims it is behind the hacking of PBS’s website too. Here the hackers stole passwords and other sensitive data, as well as posting a false story claiming that Tupac Shakur, a rapper who died in 1996, was in fact alive and kicking in New Zealand. They then sent tweets taunting the media outfit. One read: “Anyway, say hello to the insides of the PBS servers, folks.” LulzSec also separately posted a message justifying its attack on Sony, saying the company’s approach to handling sensitive data was “disgraceful and insecure”.

    The rise of “hacktivism”, which involves groups of hackers not necessarily driven by financial gain (though this can be a handy by-product of their nefarious activities), poses a growing challenge to companies and governments. Often the motive is revenge. LulzSec claimed its attack on PBS was motivated by the media organisation’s decision to air an investigative report that included criticism of WikiLeaks, the organisation that has been publishing leaked diplomatic cables. Anonymous, a hacker collective that has gained global notoriety for penetrating the networks of credit-card companies and other organisations, has also justified some of its actions by saying they are protests at the way in which Julian Assange, the founder of WikiLeaks, has been persecuted by governments and courts.

    Other hackers are launching what many reckon are government-backed intrusions over the internet. This week Google revealed that a cyber attack originating from China had used a technique known as “spear phishing” to extract Gmail passwords from unwary users. This was used to read the emails of senior American officials, journalists, Chinese political activists and government officials in several Asian countries, most notably South Korea. The Chinese government denied it had anything to do with the attacks, but some experts note that Chinese hackers often operate independently, but with the tacit approval of the state.

    There is certainly evidence that some online intrusions are the result of a very different approach to the random assaults mounted by hacktivists. Earlier this year, RSA, the security division of EMC, a data-storage firm, admitted that it had been the victim of “an extremely aggressive cyber attack” that gave the hackers information about RSA products designed to protect customers’ systems. It is possible that some of that information may have been used in the attack on Lockheed Martin. 

    The details of the intrusion are not fully known, but in Lockheed Martin’s case it is clear that hackers were able to install so-called “keylogger” software on a remote computer accessing Lockheed’s network. This allowed them to see the user’s password and any security codes entered from an RSA SecurID token, which companies such as Lockheed use to generate unique passcode numbers every 30 seconds for their employees as an additional level of protection. 

    Harry Sverdlove, the chief technology officer of Bit9, a security company, thinks that the hackers may have used these data in combination with information gleaned during the RSA intrusion to penetrate Lockheed’s network. And he reckons that one consequence of this and other cyber attacks will be to get companies to tighten controls on vulnerable “endpoints”—portable computers and other devices that access networks from a distance. Another will be to stiffen official resolve in America and elsewhere to tackle cyber aggression more forcefully. It is surely no coincidence that Lockheed’s news came out at pretty much the same time that the Pentagon in America was floating the notion that cyber attacks launched by another nation constitute an act of war that justifies a riposte involving traditional military force.

  • Geosocial networking

    The secret sexism of social media

    Jun 3rd 2011, 10:22 by E.G. | AUSTIN

    AT THIS year’s SXSW festival held in March in Austin, I ran into a social-media wonk from New York and asked him how he had been enjoying it. He said it was great: he had won five badges from Foursquare, a geosocial service that lets users check in at various locations, securing the mayorship of his hotel's pool. 

    It occurred to me that I have yet to hear a woman brag about getting a badge from Foursquare, and that I never will. In fact, come to think of it, I barely hear women mention such services at all. Over the following weeks I kept a sharp eye (and ear) out, and only found one friend—tech-savvy and typically an early adopter of all manner of gadgetry—who described herself as a Foursquare fan. Just the other day, she said, she had been sitting by herself eating a lonely crepe. Killing time, she checked in to the restaurant and, as luck would have it, a friend who was in the neighborhood dropped by. 

    Rummaging around the internet, I found that my friend was indeed an outlier. According to Pew, a research outfit, geosocial services like Foursquare and Gowalla attract twice as many men as women. What makes this finding striking is that, in general, women use social media more heavily than men do.  (The pop-psychology explanation: women are more social then men.) So why do women lag men in geosocial media?

    I would offer two hypotheses. The first is that women's concerns about security differ from men's and are warier of broadcasting their physical location. The second is that Foursquare and Gowalla are partly about competition: if users check in frequently, they can win points and badges. And broadly speaking, I don’t think women are as motivated by badges as much as men are. (Incidentally, the Pew numbers also showed that online Hispanics are far heavier users of geosocial apps than online whites and blacks—I have no idea what to make of that, but perhaps our commenters do.)

    Either way, the gender disparity clearly exists. In the case of Foursquare and Gowalla, this is not much of a problem; while these services may be fun, no one is severely disadvantaged (at least not yet) by failing to participate. But any business should be aware of its inadvertent biases, and entrepreneurs ought to be attentive to these gaps in market coverage. Foursquare and Gowalla are growing, but they might grow more quickly if they figured out how to encourage the other half of the population to sign up.

  • AIDS at 30

    From the archive: Next they'll tax it

    Jun 2nd 2011, 19:32 by The Economist online

    JUNE 5th marks 30 years since America’s Centres for Disease Control and Prevention reported a cluster of unusual infections in Los Angeles. These were the first cases of acquired immune deficiency syndrome, better known as AIDS, to be recognised by medical science. Since then it has killed 25m people (with another 34m currently infected). Now, as we argue in this week's print edition, it appears that the thirty years war against one of the scourges of the late 20th century can be won, if the world has the will to do so.

    The Economist first mentioned AIDS in October 1982, 16 months after that first clutch of infections, portentously acknowledging that "there has never been anything quite like this." Nevertheless, at the time no one could have anticipated the extent of the damage AIDS would wreak in the ensuing decades. Readers may bear that in mind as they read the article's (somewhat incongruous) title, its first sentence and the picture caption (move the cursor over the photo to see it). With hindsight these may seem rather crude:

    This has been a bad year for people who like to sleep around. The old venereal diseases—syphilis, gonorrhea and chla­mydial infections—do not make them unduly anxious. Those diseases are fairly easy to treat with antibiotics, though too few people are treated to keep them from spreading (there are 2m-3m new cases of chlamydial infections in America each year, 1m-2m of gonorrhea and 50,000­-100,000 of syphilis). Much more frighten­ing are two relative newcomers: genital herpes, a known disease for which there is no known cure; and, worse though much rarer, a lethal disease of obscure origin that causes its victims' immune systems to fail and strikes most heavily at promiscuous homosexual men. It is called acquired immune deficiency syndrome (Aids).

  • AIDS

    The 30 years war in pictures

    Jun 2nd 2011, 18:40 by The Economist online

    AS WITH any prolonged strife, the battle against AIDS has produced some moving images. Here are some of them.

  • Fuel economy

    The Difference Engine: Four bangs for the buck

    Jun 2nd 2011, 16:42 by J.P.

    LIKE millions of others, your correspondent’s extended family took to the road over the long weekend (Memorial Day in America, Spring Bank Holiday in Britain) that marks the unofficial start of summer. With warmer weather beckoning, the urge to migrate to the mountains, forests, beaches and deserts seems every bit as much a genetic imperative among humans as the migratory instincts of petrels, cetaceans or wildebeest.

    From June to September, Americans have traditionally taken to the roads in droves, clocking up thousands of miles for leisure and pleasure. By all accounts, this year has started off no differently. Certainly, the nose-to-tail traffic leaving Los Angeles at the beginning of the holiday weekend testified to the perennial Whitsun wanderlust.

    The surprise was the amount of traffic, given the current price of petrol. While the average pump price is down from the $4.11 peak reached just before the economy tanked in 2008, regular (ie, 87-octane) grade still costs $3.80 a gallon nationally. In California, which has some of the priciest petrol in the country, the average cost of a gallon of regular has fallen over the past week to $4.05 (€0.74/litre).

    Forced to pay over twice as much, Europeans snigger at how little it costs even Californians to fill the tank. But people in the United States pay through the nose for many other things in life (health, education, property taxes, wireless services, etc) that foreigners get for far less or even free. For most Americans, having to drop $70 or more at a gas station can still give serious pause for thought about whether the journey is really necessary.

    Yet, here’s the conundrum. Following all previous recessions, petrol consumption has been a leading indicator of recovery, bouncing back sharply as people started using their vehicles more to shop, to dine out, to seek the curious and the entertaining, and, above all, to take vacations. Despite the American economy’s belated and still timid recovery—seen in increasing sales of cars, clothing, hospitality, entertainment, and consumer goods generally (though still not housing)—the amount of petrol being consumed across the country has tumbled to 2001 levels, and shows every sign of falling further.

    The Bureau of Economic Analysis, the federal agency that churns out monthly reports on how the economy is faring, believes the 2008 spike in petrol prices and the subsequent recession have changed the consumption patterns of American motorists irreversibly. How so? The short answer is that technology and marketing have altered the type of vehicles Americans are now buying.

    For a start, the gas-guzzling V-8 engine that once ruled American roads has all but vanished from the showrooms. Starting imperceptibly in the early 1990s, American motorists traded in their eight-cylinder vehicles for the better fuel efficiency of six-cylinder models. Today, eight-cylinder cars and trucks account for less than 10% of new vehicles. In the new era of austerity, the hulking 6,000lb SUV, once the pride of the parking lot, is now ridiculed as obscene.

    Meanwhile, sales of even six-cylinder vehicles have plummeted over the past five years, from 40% of the market to 25%. The big winners have been cars with four-cylinder engines, which have increased their share of the market from 48% five years ago to 65% today. In short, the new cars Americans are buying are almost as frugal as those driven by their counterparts in Europe, if not Japan.

  • The public domain

    The ivory tower opens its treasure chest

    Jun 1st 2011, 20:28 by G.F. | SEATTLE

    "WORKS in the public domain may be used freely without the permission of the former copyright owner," the United States Copyright Office (USCO) asserts on this website. It then goes on to explain that the public domain is "not a place". So, what is it?

    Whatever it is, it seems to contain likenesses of things in two or three dimensions which, once in it, can be reproduced and fiddled with at will. (Nearly all sound recordings and most film in the US, reliant as they are on the fourth dimension of time, remain locked away due to vagaries of copyright and common law.) However, in order to have a likeness, one needs access to the original.

    Until relatively recently, all work whose copyright protection expired existed physically in one way or another, either as a unique creation, like a sculpture, or an instantiation of a mass-produced item, such as a book. If it still exists, it must be in someone's hands. That someone could be a person, a government, academic institution, foundation or business.

    However, although institutions allow researchers to view manuscripts, paintings, etc, on site, nowhere are they obliged to do so. True, since the early days of the internet in the mid-1990s museums have tended to provide glimpses of otherwise hidden parts of their collections online. But these typically came in low resolution and with restricted rights. To obtain a high-quality scan or photograph of an item, institutions have hitherto tended to charge fees and impose additional restrictions on usage. The copyright may have expired, but the property rights have not.

    Now Yale University aims to change all that. In an announcement on May 10th, the university says its libraries, museums and archives will provide free universal access to high-resolution digitisations of holdings in the public domain. A teaser in the shape of 250,000 images (in low resolution) from its central catalog of 1.5m is already available. More content is on the way, as are high-resolution versions. (The Yale Centre for British Art has its high-resolution scans online at its website already, and will add them to the central catalog this summer.) "We are simply abiding by the spirit of what the public domain was intended to do," explains Meg Bellinger, the director of Yale's Office of Digital Assets and Infrastructure.

  • Mobile phones

    Good night phone

    May 30th 2011, 19:33 by G.F. | SEATTLE

    IT'S 3 am. Do you know where your mobile phone or tablet is? Of course you do. It's in the bedroom somewhere, probably within reach on a bedside bureau. In a recent survey of a few thousand business travellers, 38% of respondents admitted to actually reaching for it occasionally. A disturbing 8% checked at least once in the middle of every night.

    The firm that conducted the survey, iPass, points out that these average figures hide significant demographic differences. Business folk in the Asia-Pacific region, for instance, with their indefatigable work style, were twice as likely as Europeans to check in the wee hours (60% against 30%). Americans ranked neatly in the middle at 45%. The young (22 to 34 years of age) were 25% to 40% more likely to wake and tap their phone or tablet than more senior folk. (Despite being American, and not that old, your correspondent is clearly more like an aged European in this regard; his smartphone and tablet are three rooms away when darkness sets in.)

    None of this comes as a surprise. But it is rather perturbing to see the numbers in the light of day. Frequent business travellers, often jet-lagged and sleepless, may find psychological succour of sorts in groggily retrieving e-mail or re-reading a forthcoming presentation. Half the survey's respondents expect to spend 30 days or more on the road this year. Yet iPass did not ask specifically about habits away from home, but about general behaviour.

    The firm also wondered why people act the way they do (respondents were allowed to give more than one answer). And so, an absent-minded 36% either forget to change the alert settings and "it pings"—or worse, want a noise to alert them while slumbering. A third blamed working with people outside their country; the same proportion claimed they were working on something important that requires their attention. As many as 36% were simply unable to sleep. Most worryingly, perhaps, over a fifth check "out of habit". 

    The surveyed group exhibit disturbing proclivities during daytime, too. Nine in ten fiddle with their smartphone during so-called downtime, and 7% check for e-mail or use apps ten times an hour when they should be doing something else. Compared with previous surveys, iPass notes an uptick in such obsessive behaviours.

    These habits spill over into other areas. Asked whether mobile technology interfered with their personal relationships, 29% of the respondents said yes. This being a highly personal question, one expects the honest number to be even higher.

    Many jobs now demand constant connectedness, leaving little space for life outside of work. Indeed, while 64% of those asked said it was unacceptable to take a call in a public toilet, 29% confessed to talking on the loo. The line between work and private life has to be drawn somewher. At the toilet door, perhaps?

  • Rare metals

    Re recycling

    May 29th 2011, 20:03 by A.M.

    READERS may be forgiven for not having heard of rhenium (chemical symbol Re). It was discovered comparatively recently in 1925 and, at seven parts per billion, is one of the rarest elements in the Earth’s crust. Despite its elusiveness, the metal’s unique characteristics, including a high melting point of 3,186°C, endear it to manufacturers of things like jet engines. With the continuing global boom in air travel, its value has soared, increasing sevenfold since 2005, and making it one of the dearest industrial metals, and a darling of commodities speculators.

    Until natural deposits start running dry, higher demand will probably be met through increased extraction, still the most economically viable solution. However, a new report just published by the United Nations Environment Programme (UNEP) warns that this approach may be unsustainable.

    For a start, extraction of rhenium cannot be ramped up at will. It is a so-called companion metal, left over from molybdenum production, itself a by-product of copper mining. As such, its supply is tied to demand for copper. Second, like many metals, rhenium occurs naturally in specific pockets. The vast majority of global rhenium is produced in just two countries, Chile and Kazakhstan. 

    In principle, aircraft do not need rhenium to stay aloft. However, as Thomas Graedel, an industrial ecologist at Yale University, and the lead author of the UNEP report, points out, the reason many modern products work so well is that they use materials whose properties are just so. "Without them, performance would suffer—slower computers, fuzzier medical images, heavier and slower aircraft."

    One way to deal with limited supply of raw materials is to look for suitable alternatives. General Electric, one of the world’s biggest makers of jet engines, has spent years developing nickel-based superalloys to replace rhenium. But the best GE's boffins could manage was to reduce the amount of metal required, not eliminate it altogether. Moreover, few manufacturers possess the resources to achieve even such limited progress.

    The second option is to recycle. Unlike over one-third of all metals, rhenium has actually seen a rise in recycling rates (although less than a quarter of the stuff found in new jet engines is second-hand). This has been helped by its frothy price, and the fact that it is easy enough to pinpoint and extract from scrapped jet engines. By contrast, modern mobile phones, which may contain up to sixty useful and rare metals, are too small and fiddly for triage to be worth the effort. The upshot is that many valuable materials end up in landfills or are melted into new metallic alloys, wasting their unique properties.

    It would be foolish to underestimate the ability of materials scientists to come up with clever way to do without scarce metals. But research and development take time. Even if they do eventually succeed, the periodic table may have shrunk, leaving producers of fancy gadgets in the lurch. It may turn out that for a vast array of metals, recycling will soon no longer be a lifestyle choice; it shall become an economic exigency.

  • Cars

    Tour de horsepower

    May 27th 2011, 17:12 by J.P.

    BABBAGE is no motoring journalist. He knows little of cars, perhaps a little bit more about how they work in theory. Although he has owned vehicles in the past, he rarely drives, especially since he moved to relatively central London where possessing a vehicle mostly causes grief. But he loves them. And after surviving Britain's Society of Motor Manufacturers and Traders (SMMT) test day on May 26th, he loves them with a reinvigorated passion.

    Every year, the SMMT invites hacks whose work brings them into contact with the motor industry and its products for what ultimately amounts to a boys' day out.* The producers it managed to corral at the Millbrook test facility north of London did not skimp. Many brought along some of their top models, many worth well over £100,000 ($160,000) apiece, and handed the keys over to grovelling reporters without so much a flich. (Though some did insist that a minder be present in the fanciest machines.)

    To Babbage, four cars stood out. These were, in driving order: Jaguar E-Type, Fiat 500 Abarth, Mercedes SLS AMG and Audi R8 Spyder (see above). Babbage will leave engine sizes, piston counts, 0-60mph times (0-100kph for those of a metric persuasion), waggish quips about handling, ride, etc, to the experts. The impressions that follow are just that, impressions.

    Start with the E-Type. Babbage has been pining to drive one ever since a colleague waxed lyrical about the beast in a Difference Engine column a while back. On the technical front, all your correspondent can say is that, unlike all the modern cars he has driven, this one had the indicator switch on the right-hand side of the steering wheel, where the lever for operating the windscreen-wipers would normally be; the latter were activated by flipping a switch on the dashboard. (A more experienced colleague tells Babbage that set-up was typical in cars from the 1960s.) It also, discomfittingly, lacked outside rear-view mirrors; the one inside was useless, too, given the blur afforded by the plastic rear window on the soft top. In brief, it was impossible to shake off the thought of driving a bit of automotive history—history being the operative term.

    The Mercedes, meanwhile, offered a glimpse of the future; or the present, if you have £170,000 to spare. Aesthetically, it may well be the single most pulchritudinous automobile Babbage has ever set his eyes on. A happy marriage of Art-Déco chic with an utterly contemporary sveltness, it is the 21st-century answer to the graceful E-Type (and, more directly, Mercedes's 300SL Gullwing coupé from 1954). Indeed, the two look very much alike: the same priapic bonnet attached to a roundish canopy, almost boatlike when viewed from behind the steering wheel—an effect strengthened by the rain spluttering intermittently over the windscreen during both rides. A few tweaks and the thing would be fit for Batman. Needless to say, it goes like the clappers.

    However, the chasm between the cars of yesteryear and those of today was made starkest by the cheap (well, cheapish, at just over £12,000) and cheerful Fiat Abarth. On the track this rocket-powered skateboard, as one colleague put it, would, of course, be blown to kingdom come by the Mercedes. Yet it would run rings round the apotheosis of top-notch engineering from the 1960s. Readers will forgive Babbage the trite comment, but the discrepancy, experienced first hand, was quite remarkable.

    And then there was the Audi. Your correspondent had the good fortune to get his hands on it during a rare dry spell. This meant being able to drive it with the roof down, ensconced in the cosy cockpit. The car's electronics ensured that it maintained its poise even with as mediocre a driver as Babbage at the wheel. To invoke another hackneyed trope, the machine formed the extension of the driver's body. An odd and wonderful feeling that is. A first for this driver. Mrs Babbage would be forgiven for feeling jealous.

     

    * Yes, true to stereotype, ladies were in short supply—shorter even than in the CERN caffeteria dominated by male physicists. (The overall proportion was boosted, unsurprisingly, by the number minding the producers' booths.) A shame, that. Babbage overheard one diminutive female colleague working for Girl Racer magazine explain how she deals with (increasingly rare) disparaging offers for her test car to come in pink. "If it has 300 horse power under the bonnet, I don't mind that it's pink," she would retort.

  • Controlling illegal fishing

    Fish and chips

    May 27th 2011, 12:13 by M.C.

    FOR those keen on environmental sustainability, eating fish ought to leave a bad taste. One fishery in four around the world has collapsed in the past 50 years. The Marine Conservation Society, an advocacy group based in Britain, has a set of guidelines about which fish should or should not be eaten. For example, cod caught in the northeast Arctic, eastern Baltic, or Iceland are fine, while those from the western Baltic or Faroe Plateau should be eaten only with the nose held.

    The problem is knowing precisely where the fish on the plate came from. Punters typically have no inkling of where their meal was caught. Nor, for that matter, do the restaurants and grocery stores selling it. Only the fishermen really know their source, and they may be cagey about revealing it, for illegal fishing is rampant. Two-thirds of North Atlantic cod catches are believed to go unreported. Since limits on minimum fish size and total catch vary from region to region, according to the health of the local piscine population, fishing boats often lie about the location of their catches. Hake caught in the Atlantic must be 27cm long, for example, while those caught in the Mediterranean need measure only 20cm. No points for guessing what happens where those two bodies of water meet.

    To complicate matter further, some fish are worth more than others of the same species. Baltic cod fetch less than their Atlantic counterparts because they have lower-quality flesh and higher levels of contaminants. North Sea sole are cheaper than their Mediterranean cousins for the same reason. Fraud occurs at many levels between the ocean and the plate. A recent study found that 25% of putative cod or haddock bought from fishmongers and take-away restaurants were not even the right species.

    Fishermen, however, may not be able to hoodwink consumers for much longer. FishPopTrace, a European consortium, has developed a DNA microarray that can track which population a fish comes from. These gene chips, as they are colloquially known, pick out differences in single-nucleotide polymorphisms (SNPs, pronounced "snips")—small fragments of DNA that vary from individual to individual, and population to population. FishPopTrace researchers looked at four economically important, and thus overfished, species: cod, hake, herring and sole.

    FishPopTracers started by sequencing thousands of individual fish genomes to find SNPs characteristic of each population. It turns out, for instance, that a single SNP can distinguish a North Sea sole from a Mediterranean one. Cod and hake each require about ten SNPs, while herring require about 30.

    The cost of the chip will depend ultimately on how many SNPs are required, but analysing a sample should cost no more than $10, and that should drop as the technology matures. A European Commission report, published today, recommends the use of this type of forensic technology in the battle against illegal fishing. The chips for cod, hake, herring and sole could be available for commercial use within months, with chips for other species to be rolled out within a year.

    DNA is a sturdy molecule, so samples of fish taken anywhere along the trip from ocean to fork can be tested. With luck, then new chip will inject some much-needed truthfulness into a market now rife with lies. Regulators will be better able to prosecute unscrupulous fishermen. Restaurants and wholesalers will find it easier to ensure the honesty of their suppliers. And diners will know when to turn away from a plate in disgust.

  • Wind power

    The Difference Engine: Tilting at turbines

    May 27th 2011, 12:08 by N.V. | LOS ANGELES

    A STEADY ocean breeze chilled by a current that sweeps down the coast from Alaska cools your correspondent’s hillside home in southern California better than air-conditioning. The breeze is especially welcome during the summer months, when the temperature soars to 85ºF (29ºC) at the beach, 95ºF downtown and over 105ºF in the valleys. At other times, though, it can make one particular part of his backyard uncomfortably chilly. Unfortunately, that part is the best place to sit, chat, cook and sip a glass or two while watching the sun go down and the sailing boats head back to the marina.

    Over the years, various solutions have been tossed around. A hedge would do a good job of diffusing the wind, but would block the spectacular views of the ocean, mountains and city that the house was bought for in the first place. A glass fence might easily make things worse—as the turbulent airflow, spilling off the top, created all manner of eddies and back-currents on the downstream side where folks want to sit. A ramp-like structure, designed to divert the windflow over the top of the house, was deemed impractical. The favoured solution at the moment is a wind turbine to sap surplus energy from the breeze.

    The object would be simply to still the wind rather than generate electricity. It would be nice to produce some spare kilowatts on the side. But that is impractical, given a prevailing wind speed of only 5-10mph.

    To see why, consider a typical windmill—or what those in the business like to call a “horizontal-axis wind turbine” (to distinguish it from the type that spins about a vertical axis like a Savonius or Darrieus turbine). Determining the power available from a windmill is not rocket science, but the mathematics can quickly becomes arcane. Suffice it to say that the power available for harvesting depends on the cube of the wind speed and the area swept by the rotor—in other words, the square of the blade length.

    As a rule of thumb, a turbine with a five-foot (1.5 metre) diameter rotor spinning in a 10mph (16km/h) wind can theoretically generate 100 watts of power. Given the cube effect, a doubling of wind speed means the power generated goes up eight-fold, to 800 watts. Double the length of the blades, and the power increases a further four-fold, to a useful 3.2 kilowatts—over half that needed to power a typical home. Obviously, big rotors and high winds get the job done.

    But only up to a point. In the real world, not all the power a wind machine is capable of producing can be harvested. Where the First Law of Thermodynamics says the best you can do (when trying to extract work from a machine) is to break even, the Second Law says, forget it, you can’t even do that. Friction and other losses mop up some of the output. In the absence of such losses, you would have a perpetual-motion machine—something which, despite the patent applications by countless crackpots who believe they can suspend the laws of physics, is demonstrably impossible.

    With wind turbines, however, the energy losses do not stop with the inexorable effects of entropy. An additional limit to a turbine’s output was discovered in 1919 by a German physicist called Albert Betz. Again, skipping the arcane maths, Betz’s Law says no turbine can capture more than 59.3% of the kinetic energy in the wind (don’t ask, but the term 42/33 drops out of the theory).

    For his calculations, Betz assumed that the rotor was infinitely thin, had no mass and no hub; that the airflow through it was purely axial and did not get churned up; and that the air was incompressible, its density constant, and no heat transfer took place. In short, even Betz’s Law defines a theoretical upper limit. The best turbines on the market today convert less than 35% of the wind energy into useful work—and if anyone claims more, they are selling snake-oil.

  • Particle physics

    Not pear-shaped

    May 26th 2011, 6:30 by J.P.

    FUNDAMENTAL building blocks of matter, like quarks (which make up the protons and neutrons in atomic nuclei) and electrons (which orbit those nuclei), are called point particles. This is somewhat misleading. It implies that although they have mass, they are also, like mathematical points, zero-dimensional—in other words, they do not take up any space. In the parlance of quantum mechanics, however, to call a particle pointlike is to say no more than that it is elementary, ie, that it is not known to be made up of smaller bits. Nowhere is it stipulated that it cannot have a shape.

    Indeed, shape matters. Take the electron, the most manageable of all elementary particles, and thus the most thoroughly studied. According to the Standard Model, a 40-year-old theory which describes the behaviour of all the known elementary particles and forces of nature apart from gravity, an electron's point mass sits amid a cloud of virtual particles which pop in and out of existence—the sort of thing possible in the weird world of quantum mechanics. Theory suggests that this cloud should be an almost perfect sphere.  The crucial word, though, is "almost".

    A departure from Platonic perfection is predicted to be caused by the particle's electric dipole moment. Unfortunately, this has never been measured. That matters for two reasons. First, various versions of the Standard Model make different predictions about the size of the electric dipole moment. Measuring it would help choose between them. Second, many physicists believe the electron's electric dipole moment is a manifestation of the asymmetry that causes the universe to be made of matter.

    If the world were completely symmetrical at a fundamental level, equal amounts of matter and antimatter would have been created in the Big Bang and would then have gone on to annihilate each other, with the result that the only thing left in the universe would be radiation. Moreover, this asymmetry implies that the laws of physics would be different if the arrow of time were reversed. This might be an explanation of what is (to a physicist, at least) a strange anomaly in the fabric of the universe, namely that it is possible to travel in any direction in the dimensions of space, but only one direction in the dimension of time. Measuring the electric dipole moment, then, is the sort of thing that really floats physicists' boats. The question is, how to do it?

    Besides their putative electric dipole moment electrons have a real and measurable magnetic dipole moment. They act, in other words, like tiny bar magnets with north and south poles, making them rotate in a magnetic field. Any electric moment would arise if the particle's charge were distributed unevenly along the axis around which the particle spins in this way. The consequence would be that the particle's centre of charge and its centre of mass were not the same point, meaning it was not quite round.

    A team of physicists at Imperial College, London, led by Edward Hinds, has spent the past ten years trying to see just how round the electron really is. The obvious way to go about this task is to send electrons through an electric field and see whether they twist and turn. Any electric dipole moment would align itself with the the electric field. Since the centre of mass is offset this would make the particles precess like gyroscopes. The stronger the field, and the longer an electron spent floating in it, the more visible any such wobbling would be.

    Alas, a free electron carries an electric charge. This means that using a stronger field merely speeds it up, slinging it rapidly into the wall of the apparatus, and reducing the amount of time available for measurement. To make matters worse, an electron moving through an electric field generates its own magnetic field, which couples with its magnetic moment to cause a second, confounding precession. 

    So, instead of using electrons, Dr Hinds and his colleagues chose to work with molecules of ytterbium fluoride, a highly ionic substance. An electric field will not accelerate a neutral molecule in the way it would an electron, but it will polarise the strong ionic bond which holds the molecule together, separating the opposite charges and, in effect, isolating some of the electrons within it so that their spins can be studied.

    After more than ten years of fiddling with their set-up, Dr Hines's team has succeeded in determining that the electron is round to within one part in a million billion. That will not confoud the theoreticians too much, but Dr Hines hopes to improve the accuracy of his measurements tenfold over the next few years, and eventually to achieve a hundredfold improvement. By then, any anomalies should be obvious. If they are not, then it is the theories of physics themselves that will have gone distinctly pear-shaped.

  • Social networking

    Rules of engagement

    May 25th 2011, 11:34 by G.F. | SEATTLE

    A FRIEND has been toying with Twitter, and wonders how best to get her feet wet. Whom should she follow? What should she read? Here are some thoughts.

    Viewed as a loudspeaker for others—celebrities, creative types, or just acquaintances, pronouncing on what are all too often fatuous banalities—Twitter does indeed resemble the empty medium derided by those outside its embrace; like sitting around an abandoned and empty pool in a solitary chaise longue, with TVs blaring nearby—an experience that is neither convivial nor informative.

    Sticking to the bathing analogy, an alternative (though by no means the only one) would be to attend a crowded ocean beach, with swimmers constantly throwing themselves in and out of the water, some more expertly than others. The beach is likely to be lined with reclining observers listening to the water-borne banter, but they are not the ones having the most fun.

    Twitter rewards engagement in a way that few other media do (the sea is such a medium, albeit only in a physical sense). The relationship between users is nearly always asymmetrical: following someone does not entail being followed by them. That leads to enormous mismatches: the glitziest twitterati amass hundreds of thousands, even millions of followers, and yet themselves follow just a few dozen people.

    Babbage's friend had thrown her lot in some months ago, following a small number of people, and issuing a few tentative tweets. She was not impressed by the response. Her view of Twitter was of an unplugged toaster where the bread neither browns nor pops out.

    Suffer as he does from logorrhoea, this Babbage blathers through the day. He also, like his departed mother, knows no shame in striking up conversations with complete strangers—she, in public; he, on Twitter—that he finds interesting. As a child, he complained of her habit. Now, the grudging inheritor of it, he finds easy sociability indispensable in the digital world.

    Enter what is perhaps Twitter's greatest, and inadvertent, innovation: the goad in the form of an at-sign (@) followed by a Twitter handle, known as a mention. Twitter did not invent this referral, which was picked up from older chat-system conventions. But the firm adopted it and uses it to create threaded conversations. The mention is distinct from a direct message (DM), which Twitter created intentionally, and which allows a private bit of text to pass between two parties, so long as the recipient follows the sender. The DM is reserved for those who have established a relationship; the mention, meanwhile, works for anyone.

    Mentions may easily be ignored—@stephenfry, say, with 2,647,917 followers as this sentence is being written (likely to rise by the time Babbage is done with the post), would be physically incapable of responding to all. To make life a little bit more manageable, most Twitter software, whether from the company itself or innumerable third parties, can be set either to list all mentions in a main chronological stream mixed in with tweets by those the user follows, or only to include the mentions by the latter.

  • Repetitive tasks

    Turks of the world, unite!

    May 24th 2011, 6:40 by G.F. | SEATTLE

    AMAZON'S Mechanical Turk service was designed to turn humans into automata for tasks that could be broken down into suitably trivial and repetitive bits. It has been used to great effect by Amazon and others, and typically has tens of thousands of Human Intelligence Tasks (HITs)—like categorising images, transcribing segments of audio, or writing short bits of text—available to anyone willing to grapple with them for a pittance a pop.

    Requesters do not know the identity of workers, who are assigned unique IDs, but who may not be requested by name. Jobs may be restricted to workers who pass certain qualifying tests, however, which allows a prospective employer to screen for appropriate candidates. Workers only see the name of the requester without verification or identifying details.

    This relative anonymity means that Turk may be used for less savoury purposes like posting spam comments, ad listings, reviews, or other material on sites that require registration or verification of humanity through a CAPTCHA. It is regularly used to recruit (often unwitting) workers as human pawns in games of chess with site owners and search engines. For example, a typical task available as Babbage was writing this piece asked a worker to post a Craigslist ad for a "Like new Blackberry Torch and Iphone 4 Price: 85". The description contained links that redirect and appear to generate affiliate revenue for the requester for sales resulting from heedless Craigslist users following the path.

    Sometimes, spammers fail to pay workers, either claiming the results are too poor to merit payment (a situation which Turk allows to limit botched jobs), or through invalid means of payment, such as stolen credit cards. Such miscreants foul the pool of workers, who are less likely to trust new companies, says Panos Ipeirotis, a professor at New York University's Stern business school, who studies and tests such matters. This forces companies to pay higher rates to attract leery workers, turning many potential clients off task-based crowdsourcing.

    To see how big a problem this represented, Mr Ipeirotis and his colleagues used Turk itself. First, they selected thousands of HITs from recently registered requesters. Then, they created their own HITs, asking workers to identify whether other requesters' HITs involved spamming, and if so, what sort (creating a Twitter account and posting ready-made tweets, clicking on ads, writing a positive review, or pressing the Facebook Like button).

  • Semantic analysis

    Anger management

    May 23rd 2011, 15:48 by K.K. | TORONTO

    ON SEPTEMBER 11th, 2001, Americans' feelings of shock and sadness in the wake of the atrocity that befell New York seemed to turn increasingly into anger. Last year boffins from Johannes Gutenberg University in Germany ran the 575,000 pager messages through a computer that categorised the emotional content of the words that made them up—so, "crying" or "grief" would count as sad, "hate" and "annoyed" as angry, etc [link requires subscription]. They found that wrath rose steadily through the day, apparently in reaction to events and news reports, such as speeches by president George W. Bush, or announcements about the growing number of confirmed casualties.

    Now, though, it turns out that the rising fury might not have been caused by the terrorist enormity, after all. Instead, it was probably the result of a malfunctioning computer desperately trying to get the attention of a technician. Cynthia Pury, a psychologist at Clemson University, in America, took another look at the data [again, subscription required], and found that nearly a third of the putative anger words from the original study were contained in an automatic message sent by a device and warning of a critical failure. The message in full read as follows:

    Reboot NT machine [name] in cabinet [name] at [location]: CRITICAL:[date and time].

    Since the word "critical" was flagged as angry, the message—which went out almost 6,000 times, peaking at 552 times an hour by mid-afternoon—skewed the results dramatically. So Dr Pury crunched the data again, after removing the computer's cry for help. The upshot? Anger spilling from messages that remained now appears to have held relatively steady throughout the day.

    The huge increase in the use of social media means that automatic textual analysis of real-time reactions to events is bound to proliferate. Some of it may yet yield useful insights. But, as Dr Pury's findings show, researchers use such tools at their peril.

  • The pope and space

    Papal missive

    May 20th 2011, 20:47 by D.S. | BERLIN

    IS IT just Babbage, or is there something rather other-worldly about pope Benedict XVI talking as he plans to do on May 21st to astronauts orbiting in the International Space Station (ISS)? It will be the first such chat for a pontiff. Which raises the following question: if he is God’s representative on Earth, as millions of Catholics believe he is, then is he exceeding his brief by doing extra-terrestrial pastoral work? Or does the low Earth orbit, 320-350km above the planet's surface for the ISS, still fall under his responsibilities? Perhaps he will shed some light on the matter in his address, which you can follow live here. His Holiness is scheduled to converse for 20 minutes in English and Italian from the comfort of the Foconi Room in the Vatican Library starting at 11.11 GMT.

  • High-speed trains

    The Difference Engine: Fast track to nowhere

    May 20th 2011, 10:32 by N.V. | LOS ANGELES

    OF ALL the high-speed train services around the world, only one really makes economic sense—the 550km (340-mile) Shinkansen route that connects the 35m people in greater Tokyo to the 20m residents of the Kansai cluster of cities comprising Osaka, Kobe, Kyoto and Nara. At peak times, up to 16 bullet trains an hour travel each way along the densely populated coastal plain that is home to over half of Japan’s 128m people.

    Having worked for many years in Tokyo, with family in Osaka, your correspondent has made the two-and-a-half hour journey on the Tokaido bullet-train many times. It is clean, fast and highly civilised, though far from cheap. It beats flying, which is unbearably cramped by comparison, just as pricey, and dumps you an hour from downtown at either end.

    The sole reason why Shinkansen plying the Tokaido route make money is the sheer density—and affluence—of the customers they serve. All the other Shinkansen routes in Japan lose cart-loads of cash, as high-speed trains do elsewhere in the world. Only indirect subsidies, creative accounting, political patronage and national chest-thumping keep them rolling.

    California wants a share of that bullet-train hubris. Where Florida, Ohio and Wisconsin have turned down billions of federal dollars for high-speed rail, the Golden State has been pressing on with its $43-billion scheme to build a high-speed rail service from Los Angeles to the San Francisco Bay Area, with spurs eventually to San Diego, Sacramento and San Luis Obispo.

    The irony is that California has the highest rate of car-ownership in the country, if not the world. It also, despite years of neglect, has one of the best road networks anywhere—certainly leagues ahead of Japan’s. On top of that, it enjoys a highly competitive network of budget airlines serving its main cities. The Los Angeles Times got it about right when it editorialised on May 16th that “California’s much-vaunted high-speed rail project is, to put it bluntly, a train wreck”.

    And an expensive one at that. Between them, the federal government, municipals along the proposed route and an assortment of private investors are being asked to chip in some $30 billion. A further $10 billion is to be raised by a bond issue that Californian voters approved in 2008. Anything left unfunded will have to be met by taxpayers. They could be dunned for a lot. A study carried out in 2008 by the Reason Foundation, the Howard Jarvis Taxpayers Association and Citizens Against Government Waste put the final cost of the complete 800-mile network at $81 billion.

  • Particle physics

    Dr Van Winkle and the Large Hadron Collider

    May 20th 2011, 10:26 by J.P.

    EARLIER this week the Royal Society, Britain's venerable scientific academy, played host to a two-day shindig about the past, present and future of the Large Hadron Collider (LHC). Housed in a 27km circular tunnel beneath the Franco-Swiss countryside on the outskirts of Geneva, the LHC is the world's most powerful particle accelerator, and the pride and joy of CERN, the main European particle-physics laboratory. 

    Presentations ranged from the latest results of the four main experiments, through the niceties of accelerator engineering, data collection and analysis, to the political and financial considerations which accompanied the creation of the LHC.

    The idea to build an accelerator which would speed protons up to a smidgen below the speed of light and smash them together to produce a flurry of other, more fleeting particles, was first mooted officially in 1984. As early as July 1977, however, John Adams, then director general of CERN, intimated that the new tunnel being drilled to house the LHC's predecessor, the Large Electron-Positron collider, ought in principle to be large enough to accommodate magnets that would enable protons to be accelerated to energies above 3 teraelectron-volts.

    These are precisely the LHC's specifications as of its completion in 2009—many years behind early deadlines but, astonishingly, only slightly over budget in real terms. The machine is set to run for another 20 years. Discussions are already under way about future upgrades and complementary devices, like a linear collider which would accelerate electrons and their antiparticles, positrons, in a straight line rather than a circle before smashing them head on.

    To put inquisitive readers' minds to rest: no, the Higgs boson, supersymmetric particles or mini black holes have not yet been seen—at least the boffins involved are keeping mum for now, though they hope to be more effusive come the summer conference season. Nor has any of the LHC detectors seen any hint of the hitherto unknown particle whose putative existence was recently signalled (albeit tenuously) at the Tevatron, the LHC's American rival located at Fermilab, near Chicago (and scheduled for shutdown after Congress refused to extend its financing beyond autumn 2011).

    Nonetheless, the overall picture that emerges from the presentations (and one Babbage can confirm after paying a visit to CERN a few months ago) is of a theoretical, engineering and organisational feat whose time-horizon, size and complexity rank make it one of mankind's most ambitious endeavours to date, scientific or otherwise, alongside the Manhattan Project, the Apollo space programme, or America's mobilisation for the second world war.

    Even so, as if to nip any hint of complacency in the bud, Sir Christopher Llewellyn Smith, a luminary of British particle physics and CERN's director general between 1994 and 1998, proposed the following provocative thought experiment in his closing address to the Royal Society:

    What would a Rip Van Winkle understand of a talk on fundamental micro-physics if he fell asleep/woke up 27 years later in:

    1903/1930: nothing

    1930/1957: almost nothing

    1957/1984: almost nothing

    1984/2011: almost everything (although he would have been amazed by the sophistication and performance of the LHC detectors)

    Since 1984, the intellectual ferment of the previous 27-year periods seems to have all but petered out. Fundamental physics today is basically no different to what it was then. Unfathomably fancy devices notwithstanding, actual human knowledge of the underlying nature of reality seems to have grown precious little. Does this mean that the LHC and its kind are a waste of money and brainpower?

    To Sir Christopher the answer is a resounding "no". He is at pains to stress that were Dr Van Winkle to wake up in, say, 2015 rather than 2011, "he would find something really new as a result of experimental progress that the LHC will provide". CERN's current boss, Rolf-Dieter Heuer, also in attendance at the Royal Society (and whom we interviewed last year) is equally sanguine. He notes that the first 18 months of the machine's operation have been a string of successes, most notably the prompt rediscovery of 100 years' worth of particle physics (from the electron, first observed in 1897, to the top quark, discovered in 1995 at the Tevatron), as well as setting new records for the energy and intensity of collisions.

    All this is bound to produce fresh insights, and sooner rather than later. Any month now, physicists expect the first sighting of the Higgs boson. This elusive particle, implicated in giving the other particles their mass, remains the last as-yet-unobserved element in the Standard Model, a 40-year-old theory which links all the known particles and forces of nature bar gravity.

    Paradoxically, many experimentalists present at the meeting appeared almost to hope that the Higgs would not be found. (The theorists, invested as most are in the Standard Model, do not necessarily share this sentiment.) Failure to spot it would shake up physics and force a fundamental rethink of four decades' worth of certainties. That would ensure ferment aplenty, though it might make future fundraising a tad trickier. For all its scientific merit, not finding something is less likely to wash with funding agencies than bagging a prize particle.

    If the Higgs is observed—which most boffins still bank on—exciting times lie ahead, too. Physicists are now convinced that there must be more to reality than the Standard Model, whose incredibly successful explanations go only so far. The rub is that they have yet to come up with a universally accepted proposal as to what that more might be. Whatever it is, though, an inkling of it ought in principle to be visible at the LHC. Indeed, the Royal Society was abuzz with the talk of "unknown unknowns", to quote former American defence secretary Donald Rumsfeld. Many researchers anticipate a fecund period of discovery-driven progress to follow the past few decades where theory—in the shape of the Standard Model—came first and observations later.

    Either way, then, were Dr Van Winkle to stir from his slumber a couple of years from now, he would be in for some serious swotting.

  • LinkedIn's initial public offering

    Social sizzler

    May 19th 2011, 23:32 by M.G | SAN FRANCISCO

    LAST week The Economist gave warning in a leader that a new bubble seemed to be forming in private-market valuations of some kinds of internet companies. It also cautioned that this could ultimately spill over into public markets. The initial public offering (IPO) on May 19th of shares in America's LinkedIn, a social network for professionals, looks like a sign that this is already starting to happen.

    Before the flotation, LinkedIn's advisers had set the price for the company's shares at $45 each. No sooner had trading begun on the New York Stock Exchange than LinkedIn's shares soared as investors rushed to buy them, ultimately closing the day at almost $94. That propelled the company's market capitalisation to a whopping $8.9 billion—some 578 times its net earnings in 2010.

    That is an eye-wateringly high multiple and it is reminiscent of the ones that young start-ups going public were getting in the heyday of the last dotcom boom. Some commentators such as Paul Kedrosky have argued that the company's stratospheric valuation (which is the largest initial price tag for a tech firm since Google staged its IPO in 2004) reflects the fact that LinkedIn is the first big American social network to go public, giving investors their first chance to profit from the social-networking revolution. Others have claimed that the heady valuation the firm has been given may well turn out to be justified.

    LinkedIn is undoubtedly a solid company. It is focused on a lucrative demographic—executives looking to manage their careers actively—and, unlike other social networks, it has developed a fairly balanced set of revenue streams. These include fees from users for premium services, advertising revenues and money from companies and recruiters that use its services to find talented people. The firm also has an impressive senior management team led by Jeff Weiner, its chief executive.

    But there will be a limit to just how fast LinkedIn can scale up, given the nature of its audience. So far its revenue growth has been steady, not spectacular. The $353m that it has raised from the IPO should help the company to expand more swiftly, but it will still have to navigate tricky markets such as China if it is to succeed. And it will need to come up with many more creative ways to monetise its audience without abusing the trust they have in the service. Mr Weiner and his team have a long, hard road ahead to satisfy the investment community's great—no, make that worryingly inflated—expectations.

  • Digital photography

    Being there

    May 19th 2011, 6:57 by G.F. | SEATTLE

    The real deal

    WHY do people insist on using state-of-the-art technology to create simulacra of something apparently inferior? Given a choice, most photographers in the 1970s would probably ditch their plastic-lens cameras for a modern megapixel digital device. Who wouldn't prefer crisp, true-colour snaps (without the hassle of having them developed to boot) to pasty, yellowish blurs of yore?

    Quite a few smartphone users, it seems. There is a vast array of mobile apps designed to take a perfect, rectangular image and distort it into something square, scratchy and faux. Hipstamatic, InstagramRetro Camera and the like slap on the artefacts of particular lenses, film types and development processes to produce snapshots that those aged 35 and over recognise and identify as belonging to specific eras.

    As Walter Benjamin, a German intellectual, wrote in 1936 in his seminal (and overtly Marxist) essay, "The Work of Art in the Age of Mechanical Reproduction":

    Even the most perfect reproduction of a work of art is lacking in one element: its presence in time and space, its unique existence at the place where it happens to be. This unique existence of the work of art determined the history to which it was subject throughout the time of its existence. This includes the changes which it may have suffered in physical condition over the years as well as the various changes in its ownership.

    All works created digitally lack a unique "presence in time and space". Regardless of a phone camera's precise foibles, a digital picture will never suffer the indignities of age, and a picture taken in a well-maintained phone today and with the same item in 50 years will have identical properties. In Sally Potter's rendition of Virginia Wolfe's Orlando, she has Queen Elizabeth I say to the book's eponymous hero, "Do not fade, do not wither, do not grow old." And he does not. He remains inexplicably exempt from time's passage for centuries as the world is transformed around him. The digital image is become Orlando.

    Nearly all smartphone pictures Babbage sees through Flickr, Twitter or Facebook have suffered a transformation into some such faux format. It is as if the shooters wish to distance themselves from the clarity that the digital images reveal. Stark and crisp, they may tell the story too well. Or perhaps the motivation is closer to what Steward Brand wrote of in his book, How Buildings Learn:

    Age is so valued in America, it is far more often fake than real. In a pub-style bar and restaurant you find British antique oak wall panelling—perfectly replicated in high-density polyurethane.

    The use of this photographic jiggery-pokery seems particularly galling because of a few remarkable apps and techniques that make images more rather than less honest, enhancing the clarity and dynamic range. Babbage has tested many iPhone panorama apps, which allow users to stitch together multiple images automatically or by hand. Some require merely that the phone be waved around; the software does the magic. Others, like Panoramatic 360°, offer visual aids to make edges match before assembly.

    The Synthcam app can simulate the effect of depth of field, in which one object is in remarkable focus while—as with human visual perception—all else recedes into blurriness, through careful movement to capture enough data. Camera+ has invented the mythical Make Better button, an item added in a recent update and labelled Clarity. Tap it, and a combination of non-linear adjustment and sharpening produces something that has the feel of being taken by a more expensive camera.

    And the technique known as high-dynamic range (HDR) imaging combines multiple images taken in rapid succession with different exposures to produce a single composite of extraordinary range of tonality. HDR images capture the subtlest shades in the brightest and dimmest areas of a photograph. Apple built an HDR mode into its iPhone operating system, and several apps are available as well.

    This Babbage is probably being too harsh. Taking pictures and degrading them into something that looks like it might have been taken 40 or more years ago is a valid technique to make a statement about the subject. Despite his misgivings, and irritation about overuse, it is no different than selecting lenses and choosing aperture over shutter priority in arranging a shot. These apps help smooth over a lack of composition and proper exposure. It's also a lark.

    Your correspondent is planning his own photography app, which he will call "Benjaminagram" or possibly "In Advance of the Broken Camera". Images captured through a smartphone and processed by the app will be incapable of being transmitted from the device. A single copy will exist in the device's storage, resist being backed up or transferred, and eventually disappear for no logical reason. There will be no copies.

About Babbage

In this blog, our correspondents report on the intersections between science, technology, culture and policy.

Follow Babbage on Twitter »

Advertisement

Trending topics

Read comments on the site's most popular topics

Advertisement

Products & events
Stay informed today and every day

Subscribe to The Economist's free e-mail newsletters and alerts.


Subscribe to The Economist's latest article postings on Twitter


See a selection of The Economist's articles, events, topical videos and debates on Facebook.

Advertisement