world’s largest flower?

http://www.smh.com.au/ffximage/2006/11/02/titan_arum_wideweb__470x311,2.jpg

The titan arum “flower.” Among its properties:

  • It’s big – up to 3 meters. The plant itself can be even larger.
  • It rarely flowers. Its root takes years to store up enough energy, apparently.
  • It attracts flies, so it smells like rotten meat. (It’s not carnivorous.)
  • Its real name is Amorphophallus titanum (I’m not making this up.)

So this thing has been on display at the Australian Royal Botanic Gardens, and one just flowered today, I guess. The one in the middle is what I am referring to. The one on the left is about to flower. The one in the back with leaves is in “growth” mode. I put “flower” in quotes because it’s not really one flower. The stalk and wrap are just appendages. The actual multiple flowers are all on the stalk, and there are two kinds, male and female, which mature at different times to prevent self-pollination.

An Australian paper had this to say:

A native of central Sumatra’s rainforests, the rarely seen flower is said to be the world’s largest flower, standing more than a metre tall.

On the few occasions one does bloom, it produces the stench of rotting flesh, giving rise to its other common name, the carcass flower.

The plant’s powerful pong is matched by its equally unappealing scientific name. Amorphophallus titanum, explained Steve Bartlett, a senior horticulturist at the gardens, “means huge deformed —

— Okay, Steve, let’s cut you off there,

The last time a titan arum flowered in the gardens, in October 2004, 16,000 people queued for a look. It was only the second time one had opened in Australia, and one of the few times in the world, outside Indonesia.

That plant was grown from seed collected in Sumatra in the early 1990s. Sydney horticulturalists later took cuttings, successfully producing two new plants

“It was originally thought they couldn’t be grown from cuttings,” said Mr Bartlett, also responsible for plant propagation at the gardens. To his delight, both new plants produced buds.

It turns out one reason people grow these (besides the novelty) is because they are endangered. And they are endangered because, well let’s see, they waste their time growing a huge root so they can occasionally grow a huge stalk; they try to get insects to pollinate them by deceit instead of mutual benefit; a decade may pass without flowering, and then, when they do flower, they don’t self-pollinate, so they may not ever produce seeds for a new plant unless there are several of them nearby. Clearly, these things are badly evolved. Just like panda bears. Terrible.

p2ptv

p2ptv, fancy acronym for non-point-to-point broadcast of video, I guess? There is not much information around, except that this is supposed to be “based on bittorrent.” I remain confused.

There has been talk of internet tv for at least a few years now, and while the likes of Youtube have caught on in the last couple of years, I distinctly remember reading about p2ptv quite recently – no more than a year ago. It was in the context of some legal shutdown though. Next I heard about it again was sometime this summer, when at least the software development end of it took off – now there are a dozen competing projects implementing p2ptv. Apparently the driving force was the World Cup. Understandable.

What’s surprising at first is that almost all (or all?) of these projects are taking place in China – in Chinese universities, in Chinese startups, by Chinese hackers, you name it. Many of the channels served are also Chinese stations. And, the English in these products is fairly decent.

There are several stories here:

  • Apparently, the lax digital rights enforcement in China has directly resulted in China taking the lead in pushing internet tv toward the mainstream. This is hilarious. This didn’t come out of nowhere, either. For years, Chinese web sites have been offering pirated movies and tv programs for on-demand viewing online – for a fee. There is of course, bittorrent, for downloading movies. And it’s not just movies or tv shows, music, too – the search function is right there on Baidu. I’m glad some good technology is coming out of this legal mess. (On the other hand, some Chinese TV stations already embrace this model, sometimes feeding their own streams.)
  • The Chinese software industry has finally matured to a degree where it can satisfy more than a domestic demand. There has been the likes of KingSoft and Tencent, which dominate their respective niches in China, but this is the first time that Chinese software is serving a purpose that just isn’t being served by any other software.
  • The English skills of this generation of students are good. With regard to this, somebody pointed out that propaganda pamphlets during the Korean War had perfectly good English – why has there been so much Chinglish since then? My answer is that, right after that, there was a generation of people educated in Russian, then a generation of people educated in nothing but political slogans, then a generation of people who learned English on their own by listening to tapes, and finally, now, the generation being properly educated in English courses. The drop-off in quality and the current improvement both make sense.

Anyway, I downloaded TVUPlayer (one of the lesser clients, TVants being the most popular), and took a test run last night. It worked pretty well. Among the channels, NBC, Comedy Central, ESPN, CCTV, Hunan Dish TV, CTI TV, Pheonix TV, etc. Finally I can watch those Taiwan LY fights live, hoho. Now that’s entertainment.

matrix factorization

This question was floating around: can a determinant-1 diagonal matrix be factored into a product of triangular matrices with 1-diagonals, and how?

At least for the 2-by-2 matrix, this is answered in the affirmative here (Section 8.3). Here is a recapitulation.
(Read the article)

Chin Chun Hock

Somebody forwarded me an article on Wikipedia. Actually as of today, the article contains 4 sentences:

Chin Chun Hock was the first Chinese man to settle in Seattle. He arrived in 1860 and was employed as a domestic worker. By 1868, Chin Hock had founded a general merchandising store, The Wa Chong Co., at the foot of Mill Street. He owned the Eastern Hotel which housed the first Asian workers in Seattle.

Well, that’s not very satisfying. There is more to be known, but how to find it? True, there is likely stuff at the Wing Luke Asian Museum in Seattle and in the archives of the University of Washington, but it would be too much trouble to get at those for a lunchtime-project. Let’s just dig around.
(Read the article)

price of security

All this talk of “in real life, we accept managed insecurity” has got me thinking about the question of how much security is actually worth to people. People pay some “appropriate” amount for security by buying alarms, paying for antivirus software, buying locks and whatever. How much should be paid? Is there a model for this behavior? Here is a not even half-baked look:

Suppose your thing is worth \(D\) dollars (to everyone, for simplicitiy) and the probability of it getting stolen/destroyed is \(p_0\). Let’s actually make \(p\) a function of how much you pay for security, so \(p(S)\). This function is, say, monotonically decreasing in \(S\) with \(p(0)=p_0\). Then the worth of \(S\) security dollars is \((p(0)-p(S))D\). I guess you should not pay for security when \(S>(p(0)-p(S))D\), and you should aim for \(S^*=\arg\max_S{(p(0)-p(S))D-S}\) when you should pay.

Another question altogether is how should security services be priced? They should probably be priced such that \((p(0)-p(S))D=S\), but are they? No idea.

So far so good. At this point, I’m taking a digression because I am reminded of my bicycle. It’s a piece of junk but I lock it. Next to a nice bike. Even better if the nice bike has a worse-looking lock – although that doesn’t happen usually. My bicycle never gets stolen. This happens with recommendations for securing computers, too. Often there is advice to hide unused ports, leave small footprint, make yourself less of a target, etc. As long as it takes less effort to get more from somewhere else, you are somewhat secure, although you really aren’t. So there is the idea of competitive influence in the security problem.

So let’s say your neighbor also has a thing worth \(D\) dollars and \(S’\) is thrown into security for it by your neighbor. Now if you don’t pay more than your neighbor for security, it’s like you haven’t paid at all. Define a new function \(p’(S)=p(0)\) for \(S\leq S’\) and \(p’(S)=p(S)\) for \(S>S’\). Then you should aim for \(\tilde{S}^*=\arg\max_S{(p(0)-p’(S))D-S}\) when it is nonnegative. Now it is really possible to lose no matter what. Although it is possible to have \(S^*=0\) as the solution previously, that would have been a result of particularly poor security service. This is different. Depending on what your neighbor does, you may have no way to get more security for your thing.

Of course, your neighbor would normally aim for the optimal point, as would you. So you both could try to outbid each other until you hit the next \(S\) larger than \(S^*\) where \((p(0)-p(S))D-S=0\). This would be the competitive equilibrium. But then what’s the point? Both of you could do just as well by not paying anything for security – like leaving all (equally nice) bikes unlocked. but that would be a cooperative equilibrium, which won’t happen in reality.

However, it isn’t that simple. If we think about how a security service is able to decrease the probability of a thing getting stolen/destroyed, we (or I) get a headache, so that’s it for now. This may be revisited.

Csiszar & Korner

Imre Csiszar and Janos Korner are two Hungarians with very Hungarian names. But more importantly, they wrote a thrilling page-turner called, Information Theory: Coding Theorems for Discrete Memoryless Systems. It is a book most difficult to obtain. It seems that the book has been out of print ever since the day it was in print. Academiai Kiado of Budapest and Academic Press of New York (same thing?), I’m looking in your general direction(s). Hmm. I wonder if the cost structure of running a printing press is akin to that of running a chip foundry?

http://ec1.images-amazon.com/images/P/9630574403.01._AA240_SCLZZZZZZZ_.gif

Anyway, forget the publishers. There is one copy in the library, permanently checked out, on hold, or requested. Almost never seen in online stores, it sells for several times the list price when scalper123 occasionally trots it out on YahooMazonBay. Worst of all, nobody has bothered to make and distribute a pdf of it for the good of the masses. Er, wait, I mean, nobody has bothered to make a Fair Use copy for personal use.

And accidentally leave the pdf on an unprotected public server. (Please?)

Well, that was last week, and this is now. I am to this day amazed that Kazoo Books still had one (1) old, used, but perfectly good copy at list price. I wrote “had.” Good service and fast delivery, too. No fraud committed against me despite there being a phone transaction with a credit card. Highly recommend. Wait, this isn’t eBay, why am I writing this?

A little Markovian problem

Here it is: 

A has a fair coin and B has a fair coin. They flip coins together, but only keep track of their own sequences of heads and tails. A stops if the sequence “HHT” appears. B stops if the sequence “HTH” appears. Which player is more likely to stop first?

(Read the article)

remote payment security

Credit cards. Epitome of security by obscurity? It isn’t even much obscurity. Whoever gets a hold of a card or makes a mental image of it can pretty much do anything until the account is suspended. I guess banks run fraud-detection algorithms, but still they, and therefore we, absorb the cost of fraud. Fighting fraud: it’s what Paypal says it spends its R&D dollars on.

Credit card number, name, billing address, expiration date are informational, so I don’t know how they have come to be used as “secrets” for a secure transaction. Seems like a terrible idea. Then there is the 3-digit CVV code. Would somebody mind explaining its utility to me? How does 3 more digits prevent fraud? (They are on the card just like the front-side numbers and they also must be disclosed during a transaction.)

There exists technology, but little infrastructure, for authenticating and trusting the remote host (or person — phone orders are even worse). For online transactions, banks have come up with at least two augmentations to the standard procedure to try to plug the hole. One involves password verification directly with the bank’s web site. Another is to issue single-use credit card numbers. Four soundbites ensue: Inelegant! Ad hoc! Not standardized! Unsatisfactory!

But this is moving in the right direction.

Many are grossly concerned with computer security and wireless channel security. Some are paranoid to the degree that nothing short of provably secure is acceptable for transmitting a few worthless bits that in reality nobody cares about. But we seem to settle for the foundational insecurity that underlies any kind of current remote payment using credit cards. Apparently managed insecurity is accepted, even if it deals with money, about which people should actually care. That’s a strange social phenomenon.

troll and trolling

Wikipedia says:

In Internet terminology, a troll is a person who enters an established community such as an online discussion forum and intentionally tries to cause disruption, most often in the form of posting inflammatory, off-topic, or otherwise inappropriate messages

What is a troll in Chinese? I don’t think there is a term. Wikipedia’s “in other languages” sidebar offers up 小白 for troll, but that just means idiot or annoyer, someone with a thick skin or someone who doesn’t get it; so no, that’s not exactly a troll. It doesn’t capture the aspect of intention and the not infrequent subtlety of trolling. The article on 小白 itself is hilarious. It’s obvious the usage is restricted to Taiwan.

Mainland and overseas Chinese BBS are full of subtlety to begin with, for reasons not worth mentioning at this moment. Maybe every Chinese is a native troll. Certain Chinese history points to training in – ah nevermind, I’m trolling. However, a subset of more benign trolling behavior seems to elicit more condemnation on these Chinese BBS and have terms associated with them. For instance: posting off-topic messages and inappropriate messages can take the form of 刷屏 or repeated re-posting, or posting in multiple sub-forums. Posting a stream of emoticons or other useless messages (to readers) such as 顶, 批, 阅, 路过 to increase the number of posts by one is known as 灌水. The meaning of 灌水 has expanded to include, in some cases, posts that are not just useless, but specifically useless for ongoing rational discussion. Since a post that elicits 灌水 behavior is known as a 坑 and somebody who writes such is engaging in 挖坑, then 挖坑 may yet emerge as the logical equivalent of trolling (verb). It has been used in that sense already.

Still no word for troll (noun), though 坑王 is a good candidate.

What is this “blog”

…you speak of… what, do I write to myself? I only have 100MB.

First post and already TeX can be rendered. I stole the idea from fakalin.

\( \int_{0}^{1}\frac{x^{4}\left( 1-x\right) ^{4}}{1+x^{2}}dx = \frac{22}{7}-\pi \)

« Previous PageNext Page »