What if you do the right thing for the wrong reason?
I closed and drew for my love’s sake
That now is false to me,
And I slew the Reiver of Tarrant Moss
And set Dumeny free.
Now here is something you don’t see every day. Or do you?
This is “Chłopiec niosący snop” – “Boy Carrying a Sheaf.”
A snop is a sheaf, of wheat or barley originally, in Europe. At harvest, the peasants glebae adscripti walked along in a line, each with a scythe, cutting the stalks and binding them into sheaves. If they were smaller ones they would be stacked three or four together, upright, so that the rain would mostly drain off.
Below are stooks of barley sheaves in Somerset, England. (Thanks, Bdk, for the upload to Wiki.)
After a few good drying days they would be brought into the barn. In the quaint and far-off times, this was done by taking the biggest snop each child could carry, and sticking it on his head.
Aleksander Gierymski painted “Chłopiec niosący snop” in 1893 in a Polish village called Bronowic. Looks like a good dry day, doesn’t it? By the shadow I would say it is late morning, which it would have to be for the dew to have burned off. The field is otherwise empty as much as we can see, so maybe they have been doing this for a few days, planning their harvest festival all the while.
Leszek Lubicki maintains a fascinating blog, Obrazowo rzecz ujmując,(“Figuratively Speaking”) for his discussions of Polish paintings of late C19 and early C20. Lubicki includes in what I call his Snopek post, his essay on this one painting of Gierymski, a photo of the painting as displayed at the National Museum in Wrocław.
I hope they all got their harvest in on time. Around here we have gotten our corn into the silos for another year without any human injuries due to accidents. Those do occur from time to time, as people work long hours with powerful machines.
Americans continue this activity for decorative purposes, and use American cornstalks, as they would. These sheaves turn up this time of year in the oddest places:
It is good to have things snug before fall hits. I just learned a new jingle about that:
“From St. Edward’s Day [October 13th]
the fall is hard.”
After working it out with both hands, I construe that at the mid northern lattitudes, about 120 days after the summer solstice, the atmosphere has cooled down enough to notice, especially when the wind picks up. Why does it happen so suddenly?
As Mr. Bennet says in Pride and Prejudice, “I leave that for you to determine.” Stay snug.
The film Gosnell:The Trial of America’s Biggest Serial Killer was released about a week ago. It was produced by documentarians Phelim McAleer, Ann McElhinney, and Magdalena Segieda, though this film is not a documentary. This is not a film I would normally see but made an exception in this case because I (slightly) know the filmmakers. They had invited me to the L.A. premier last week but I could not attend. Surprisingly, the film is being shown in several theaters in my area, which is where I finally saw it – surprising because it was independently released and the producers faced a lot of hostility from Hollywood.
The film is about Kermit Gosnell, a physician who operated an abortion clinic in Philadelphia for several decades. He was convicted on murder in the first degree of three infants, manslaughter of an adult patient, and numerous other felonies. Aside from these major offenses, he operated his clinic in a grossly unsanitary manner and used unqualified individuals as medical personnel. The story was given national prominence through the persistent efforts of our own Mollie Hemingway. The film takes the artistic license of replacing nationally known and serious journalist Mollie with a local and unknown (presumably fictional) blogger Molly Mullaney.
In a recent interview on the Ricochet flagship podcast, Mollie said she cried though much of the film. I had a somewhat different response: disgust, anger, and a frequent desire to avert my eyes. It’s not that many graphic images are shown; the film is rated PG-13. The writers were so adept at enhancing the images with words that one’s imagination did the rest. This film is well made, with excellent actors and high production values: a significant step up from their previous work. Andrew Klavan also has a writing credit.
I hesitate to recommend the film because of the nature of the subject matter. It’s not for everyone. If you’re into this sort of thing, it is a compelling movie that you will think about long after leaving the theater.
This is the fourth novel in the Mitch Rapp saga written by Kyle Mills, who took over the franchise after the death of Vince Flynn, its creator. On the cover, Vince Flynn still gets top billing (he is now the “brand”, not the author), but Kyle Mills demonstrates here that he’s a worthy successor who is taking Rapp and the series in new directions.
In the previous novel, Enemy of the State, Rapp went totally off the radar, resigning from the CIA, recruiting a band of blackguards, many former adversaries, to mount an operation aimed at a nominal U.S. ally. This time, the circumstances are very different. Rapp is back at the CIA, working with his original team headed by Scott Coleman, who has now more or less recovered from the severe injuries he sustained in the earlier novel Order to Kill, with Claudia Gould, now sharing a house with Rapp, running logistics for their missions.
Vladimir Krupin, President/autocrat of Russia, is ailing. Having climbed to the top of the pyramid in that deeply corrupt country, he now fears his body is failing him, with bouts of incapacitating headaches, blurred vision, and disorientation coming more and more frequently. He and his physician have carefully kept the condition secret, as any hint of weakness at the top would likely invite one or more of his rivals to make a move to unseat him. Worse, under the screwed-down lid of the Russian pressure cooker, popular dissatisfaction with the dismal economy, lack of freedom, and dearth of opportunity is growing, with popular demonstrations reaching Red Square.
The CIA knows nothing of Krupin’s illness, but has been observing what seems to be increasingly erratic behaviour. In the past, Krupin has been ambitious and willing to commit outrages, but has always drawn his plans carefully and acted deliberately, but now he seemed to be doing things almost at random, sometimes against his own interests. Russian hackers launch an attack that takes down a large part of the power grid in Costa Rica. A Russian strike team launches an assault on Krupin’s retired assassin and Rapp’s former nemesis and recent ally, Grisha Azarov. Military maneuvers in the Ukraine seem to foreshadow open confrontation should that country move toward NATO membership.
Krupin, well aware of the fate of dictators who lose their grip on power, and knowing that nothing rallies support behind a leader like a bold move on the international stage, devises a grand plan to re-assert Russian greatness, right a wrong inflicted by the West, and drive a stake into the heart of NATO. Rapp and Azarov, continuing their uneasy alliance, driven by entirely different motives, undertake a desperate mission in the very belly of the bear to avert what could all too easily end in World War III.
There are a number of goofs, which I can’t discuss without risk of spoilers, so I’ll take them behind the curtain.
The copy editing is not up to the standard you’d expect in a bestseller published by an imprint of Simon & Schuster. On three occasions, “Balkan” appears where “Baltic” is intended. This can be pretty puzzling the first time you encounter it. Afterward, it’s good for a chuckle.
In chapter 39, one of Rapp’s allies tries to establish a connection on a land-line “telephone that looked like it had been around since the 1950s” and then, just a few paragraphs later, we read “There was a USB port hidden in the simple electronics…”. Huh? I’ve seen (and used) a lot of 1950s telephones, but danged if I can remember one with a USB port (which wasn’t introduced until 1996).
Later in the same chapter Rapp is riding a horse, “working only with a map and compass, necessary because of the Russians’ ability to zero in on electronic signals.” This betrays a misunderstanding of how GPS works which, while common, is jarring in a techno-thriller that tries to get things right. A GPS receiver is totally passive: it receives signals from the navigation satellites but transmits nothing and cannot be detected by electronic surveillance equipment. There is no reason Rapp could not have used GPS or GLONASS satellites to navigate.
In chapter 49, Rapp fires two rounds into a door locking keypad and “was rewarded with a cascade of sparks…”. Oh, please—even in Russia, security keypads are not wired up to high voltage lines that would emit showers of sparks. This is a movie cliché which doesn’t belong in a novel striving for realism.
This is a well-crafted thriller which broadens the scope of the Rapp saga into Tom Clancy territory. Things happen, which will leave the world in a different place after they occur. It blends Rapp and Azarov’s barely restrained loose cannon operations with high-level diplomacy and intrigue, plus an interesting strategic approach to pledges of defence which the will and resources of those who made them may not be equal to the challenge when the balloon goes up and the tanks start to roll. And Grisha Azarov’s devotion to his girlfriend is truly visceral.
Mills, Kyle. Red War. New York: Atria Books, 2018. ISBN 978-1-5011-9059-9.
Here is an Author Stories interview (audio only) with the author about the novel and process of crafting a thriller.
Two hundred years ago, halfway around the planet from where I sit, Constable painted someone fishing, or perhaps just messing around, in some little English stream I shall never see. “Tree Trunks” is the name it goes by, and the trunks are all right, as are the shadows and sun on the grassy bank. What touch me most are the browned leaves of autumn and the shimmering gold light created by those increasingly slanting sunbeams.
This is what we have now; we have it every year; amazing. Further, after the last couple of weeks we deserve it more than ever.
To go with that, here is John Keats: Ode to Autumn.
“Season of mists and mellow fruitfulness!
Close bosom-friend of the maturing sun;
Conspiring with him how to load and bless
With fruit the vines that round the thatch-eaves run;
To bend with apples the moss’d cottage-trees,
And fill all fruit with ripeness to the core;
To swell the gourd, and plump the hazel shells
With a sweet kernel; to set budding more,
And still more, later flowers for the bees,
Until they think warm days will never cease,
For Summer has o’er-brimmed their clammy cells.
Who hath not seen thee oft amid thy store?
Sometimes whoever seeks abroad may find
Thee sitting careless on a granary floor,
Thy hair soft-lifted by the winnowing wind;
Or on a half-reap’d furrow sound asleep,
Drowsed with the fume of poppies, while thy hook
Spares the next swath and all its twinèd flowers;
And sometimes like a gleaner thou dost keep
Steady thy laden head across a brook;
Or by a cider-press, with patient look,
Thou watchest the last oozings hours by hours.
Where are the songs of Spring? Ay, where are they?
Think not of them, thou hast thy music too, –
While barrèd clouds bloom the soft-dying day,
And touch the stubble-plains with rosy hue;
Then in a wailful choir the small gnats mourn
Among the river sallows, borne aloft
Or sinking as the light wind lives or dies;
And full-grown lambs loud bleat from hilly bourn;
Hedge-crickets sing; and now with treble soft
The redbreast whistles from a garden-croft;
And gathering swallows twitter in the skies.
No more have we thatched roofs, thankfully, and no more standing there winnowing grain for hours by throwing basket after basket after basket – full up into the air so that the chaff can blow away. Nor do we dose our babies with poppy juice, as my ancestors did, and lay them to snooze at the edge of the field while we go out to bend down and reap, hours by hours.
Aside from those things, Keats details all the loveliness still to be enjoyed in autumn. Our season is prolonged this year. How goes it with you all? Have you a favorite painting or poem for autumn?
The title is turning the saying “The best man for the job is a woman.” on its ear. Recently men who have become women have been winning in women’s sports. Is this fair when in taking account hormonal doping is a disqualifyer in most sports? If one is born XY, isn’t that giving a “woman” a big hormonal boost in training? Should prior men be handicapped for this advantage? (I am thinking of women’s tees in reverse.)
Here is an article from the Daily Caller that has someone who looks like a man winning a woman’s event.
Please self identify your hatred of men, women, or other before you comment. Only right opinions will be allowed. 😉
I write a weekly book review for the Daily News of Galveston County. (It is not the biggest daily newspaper in Texas, but it is the oldest.) My review normally appears Wednesdays. When it appears, I post the review here on the following Sunday.
By MARK LARDAS
Oct 10, 2018
Seventy-five years ago, science fiction authors could make livings writing short stories. Today, novels are the standard. Yet, even authors primarily writing novels create some short fiction.
“Target Rich Environment: Volume I,” by Larry Correia is proof. It’s a collection of his shorter stories.
A few, such as “Tanya: Princess of the Elves,” started out were intended a part of a novel. They didn’t fit, so they came out. Correia ran the opening of “Tanya” in his blog instead, and was then invited to complete it as a short story for publication (few authors say no to that).
A few others, such as “Bubba Shackleford’s Professional Monster Killers” and “The Losing Side” were written for short story anthologies in which Correia was asked to participate. “Shackleford” was part of the Western fantasy collection, and “The Losing Side” part of a David Drake tribute book.
A few, such as “The Bridge” and the “The Destiny of a Bullet,” were written in the setting of role-playing games. Correia is a big fan of role-playing games. “Blood on the Water,” a story set in the Corriea’s Monster Hunter International world, came out of a role-playing game Correia played with his children. It was co-written with his daughter.
There are two stories from the Grimnoire Chronicles, “Detroit Christmas” and “Murder on the Oriental Elite.” Both were originally released in audio format and appear in print for the first time in this collection.
Another audio original that appears in print in this volume is “The Adventures of Tom Stranger, Interdimensional Insurance Salesman.” It is eccentric humor, with a lot of in-jokes, but Corriea’s explanation of how it came to be is more eccentric as the story.
Think of it as a Whitman sampler of Corriea’s worlds. It offers a taste from just about every universe he has created. It also shows his range as a writer and showcases his ability to create both horror and humor and occasionally combine the two.
Target Rich Environment offers a good introduction to Coriea’s fiction. It is a bit of everything Correia writes with just a dash more.
Mark Lardas, an engineer, freelance writer, amateur historian, and model-maker, lives in League City. His website is marklardas.com.
In SJWs Always Lie Vox Day introduced a wide audience to the contemporary phenomenon of Social Justice Warriors (SJWs), collectivists and radical conformists burning with the fierce ardour of ignorance who, flowing out of the academic jackal bins where they are manufactured, are infiltrating the culture: science fiction and fantasy, comic books, video games; and industry: technology companies, open source software development, and more established and conventional firms whose managements have often already largely bought into the social justice agenda.
The present volume updates the status of the Cold Civil War a couple of years on, recounts some key battles, surveys changes in the landscape, and provides concrete and practical advice to those who wish to avoid SJW penetration of their organisations or excise an infiltration already under way.
Two major things have changed since 2015. The first, and most obvious, is the election of Donald Trump as President of the United States in November, 2016. It is impossible to overstate the significance of this. Up until the evening of Election Day, the social justice warriors were absolutely confident they had won on every front and that all that remained was to patrol the battlefield and bayonet the wounded. They were ascendant across the culture, in virtually total control of academia and the media, and with the coronation of Hillary Clinton, positioned to tilt the Supreme Court to discover the remainder of their agenda emanating from penumbras in the living Constitution. And then—disaster! The deplorables who inhabit the heartland of the country, those knuckle-walking, Bible-thumping, gun-waving bitter clingers who produce just about every tangible thing still made in the United States up and elected somebody who said he’d put them—not the coastal élites, ivory tower professors and think tankers, “refugees” and the racket that imports them, “undocumented migrants” and the businesses that exploit their cheap labour, and all the rest of the parasitic ball and chain a once-great and productive nation has been dragging behind it for decades—first.
The shock of this event seems to have jolted a large fraction of the social justice warriors loose from their (already tenuous) moorings to reality. “What could have happened?”, they shrieked, “It must have been the Russians!” Overnight, there was the “resistance”, the rampage of masked violent street mobs, while at the same time SJW leaders in the public eye increasingly dropped the masks behind which they’d concealed their actual agenda. Now we have candidates for national office from the Democrat party, such as bug-eyed SJW Alexandria Occasional-Cortex openly calling themselves socialists, while others chant “no borders” and advocate abolishing the federal immigration and customs enforcement agency. What’s the response to deranged leftists trying to gun down Republican legislators at a baseball practice and assaulting a U.S. Senator while mowing the lawn of his home? The Democrat candidate who lost to Trump in 2016 says, “You cannot be civil with a political party that wants to destroy what you stand for, what you care about.”, and the attorney general, the chief law enforcement officer of the administration which preceded Trump in office said, “When they go low, we kick them. That’s what this new Democratic party is about.”
In parallel with this, the SJW convergence of the major technology and communication companies which increasingly dominate the flow of news and information and the public discourse: Google (and its YouTube), Facebook, Twitter, Amazon, and the rest, previously covert, has now become explicit. They no longer feign neutrality to content, or position themselves as common carriers. Now, they overtly put their thumb on the scale of public discourse, pushing down conservative and nationalist voices in search rankings, de-monetising or banning videos that oppose the slaver agenda, “shadow banning” dissenting voices or terminating their accounts entirely. Payment platforms and crowd-funding sites enforce an ideological agenda and cut off access to those they consider insufficiently on board with the collectivist, globalist party line. The high tech industry, purporting to cherish “diversity”, has become openly hostile to anybody who dares dissent: firing them and blacklisting them from employment at other similarly converged firms.
It would seem a dark time for champions of liberty, believers in reward for individual merit rather than grievance group membership, and other forms of sanity which are now considered unthinkable among the unthinking. This book provides a breath of fresh air, a sense of hope, and practical information to navigate a landscape populated by all too many non-playable characters who imbibe, repeat, and enforce the Narrative without questioning or investigating how it is created, disseminated in a co-ordinated manner across all media, and adjusted (including Stalinist party-line overnight turns on a dime) to advance the slaver agenda.
Vox Day walks through the eight stages of SJW convergence of an organisation from infiltration through evading the blame for the inevitable failure of the organisation once fully converged, illustrating the process with real-world examples and quotes from SJWs and companies infested with them. But the progression of the disease is not irreversible, and even if it is not arrested, there is still hope for the industry and society as a whole (not to minimise the injury and suffering inflicted on innocent and productive individuals in the affected organisations).
An organisation, whether a company, government agency, or open source software project, only comes onto the radar of the SJWs once it grows to a certain size and achieves a degree of success carrying out the mission for which it was created. It is at this point that SJWs will seek to penetrate the organisation, often through the human resources department, and then reinforce their ranks by hiring more of their kind. SJWs flock to positions in which there is no objective measure of their performance, but instead evaluations performed, as their ranks grow, more and more by one another. They are not only uninterested in the organisation’s mission (developing a product, providing a service, etc.), but unqualified and incapable of carrying it out. In the words of Jerry Pournelle’s Iron Law of Bureaucracy, they are not “those who are devoted to the goals of the organization” (founders, productive mission-oriented members), but “those dedicated to the organization itself”. “The Iron Law states that in every case the second group will gain and keep control of the organization. It will write the rules, and control promotions within the organization.”
Now, Dr Pournelle was describing a natural process of evolution in all bureaucratic organisations. SJW infection simply accelerates the process and intensifies the damage, because SJWs are not just focused on the organisation as opposed to its mission, but have their own independent agenda and may not care about damage to the institution as long as they can advance the Narrative.
But this is a good thing. It means that, in a competitive market, SJW afflicted organisations will be at a disadvantage compared to those which have resisted the corruption or thrown it off. It makes inflexible, slow-moving players with a heavy load of SJW parasites vulnerable to insurgent competitors, often with their founders still in charge, mission-focused and customer-oriented, who hire, promote, and reward contributors solely based on merit and not “diversity”, “inclusion”, or any of the other SJW shibboleths mouthed by the management of converged organisations. (I remember, when asked about my hiring policy in the 1980s, saying “I don’t care if they hang upside down from trees and drink blood. If they’re great programmers, I’ll hire them.”)
A detailed history of GamerGate provides a worked example of how apparent SJW hegemony within a community can be attacked by “weaponised autism” (as Milo Yiannopoulos said, “it’s really not wise to take on a collection of individuals whose idea of entertainment is to spend hundreds of hours at a highly repetitive task, especially when their core philosophy is founded on the principle that if you are running into enemies and taking fire, you must be going the right way”). Further examples show how these techniques have been applied within the world of science fiction and fantasy fandom, comic books, and software development. The key take-away is that any SJW converged organisation or community is vulnerable to concerted attack because SJWs are a parasite that ultimately kills its host. Create an alternative and relentlessly attack the converged competition, and victory is possible. And remember, “Victory is not positive PR. Victory is when your opponent quits.”
This is a valuable guide, building upon SJWs Always Lie (which you should read first), and is essential for managers, project leaders, and people responsible for volunteer organisations who want to keep them focused on the goals for which they were founded and protected from co-optation by destructive parasites. You will learn how seemingly innocent initiatives such as adoption of an ambiguously-worded Code of Conduct or a Community Committee can be the wedge by which an organisation can be subverted and its most productive members forced out or induced to walk away in disgust. Learning the lessons presented here can make the difference between success and, some dismal day, gazing across the cubicles at a sea of pinkhairs and soybeards and asking yourself, “Where did we go wrong?”
The very fact that SJW behaviour is so predictable makes them vulnerable. Because they always double down, they can be manipulated into marginalising themselves, and it’s often child’s play to set traps into which they’ll walk. Much of their success to date has been due to the absence of the kind of hard-edged opposition, willing to employ their own tactics against them, that you’ll see in action here and learn to use yourself. This is not a game for the “defeat with dignity” crowd who were, and are, appalled by Donald Trump’s plain speaking, or those who fail to realise that proclaiming “I won’t stoop to their level” inevitably ends up with “Bend over”. The battles, and the war can be won, but to do so, you have to fight. Here is a guide to closing with the enemy and destroying them before they ruin everything we hold sacred.
Day, Vox [Theodore Beale]. SJWs Always Double Down. Kouvola, Finland: Castalia House, 2017. ISBN 978-952-7065-19-8.
Somehow, recent statements by Democrats on the impossibility of civility in the political sphere and their calls for their constituents to commit acts of violence brought this poem to mind. It is one of my favorites. Back in the day when FreeRepublic was just starting (and before it began becoming a little nuts), my handle was taken from this poem: No Truce With Kings.
October 9, 1899
(Outbreak of Boer War)
Here is nothing new nor aught unproven,” say the Trumpets,
“Many feet have worn it and the road is old indeed.
“It is the King–the King we schooled aforetime! “
(Trumpets in the marshes -in the eyot at Runnymede!)
“Here is neither haste, nor hate, nor anger,” peal the Trumpets,
“Pardon for his penitence or pity for his fall.
“It is the King!”–inexorable Trumpets–
(Trumpets round the scaffold af the dawning by Whitehall!)
. . . . . . .
“He hath veiled the Crown And hid the Scepter,” warn the Trumpets,
“He hath changed the fashion of the lies that cloak his will.
“Hard die the Kings–ah hard–dooms hard!” declare the Trumpets,
Trumpets at the gang-plank where the brawling troop-decks fill!
Ancient and Unteachable, abide–abide the Trumpets!
Once again the Trumpets, for the shuddering ground-swell brings
Clamour over ocean of the harsh, pursuing Trumpets–
Trumpets of the Vanguard that have sworn no truce with Kings!
All we have of freedom, all we use or know–
This our fathers bought for us long and long ago.
Ancient Right unnoticed as the breath we draw–
Leave to live by no man’s leave, underneath the Law.
Lance and torch and tumult, steel and grey-goose wing
Wrenched it, inch and ell and all, slowly from the king.
Till our fathers ‘stablished, after bloody years,
How our King is one with us, first among his peers.
So they bought us freedom-not at little cost–
Wherefore must we watch the King, lest our gain be lost.
Over all things certain, this is sure indeed,
Suffer not the old King: for we know the breed.
Give no ear to bondsmen bidding us endure.
Whining “He is weak and far”; crying “Time will cure.”
(Time himself is witness, till the battle joins,
Deeper strikes the rottenness in the people’s loins.)
Give no heed to bondsmen masking war with peace.
Suffer not the old King here or overseas.
They that beg us barter–wait his yielding mood–
Pledge the years we hold in trust-pawn our brother’s blood–
Howso’ great their clamour, whatsoe’er their claim,
Suffer not the old King under any name!
Here is naught unproven–here is naught to learn.
It is written what shall fall if the King return.
He shall mark our goings, question whence we came,
Set his guards about us, as in Freedom’s name.
He shall take a tribute, toll of all our ware;
He shall change our gold for arms–arms we may not bear.
He shall break his Judges if they cross his word;
He shall rule above the Law calling on the Lord.
He shall peep and mutter; and the night shall bring
Watchers ‘neath our window, lest we mock the King —
Hate and all division; hosts of hurrying spies;
Money poured in secret, carrion breeding flies.
Strangers of his counsel, hirelings of his pay,
These shall deal our Justice: sell-deny-delay.
We shall drink dishonour, we shall eat abuse
For the Land we look to–for the Tongue we use.
We shall take our station, dirt beneath his feet,
While his hired captains jeer us in the street.
Cruel in the shadow, crafty in the sun,
Far beyond his borders shall his teachings run.
Sloven, sullen, savage, secret, uncontrolled,
Laying on a new land evil of the old–
Long-forgotten bondage, dwarfing heart and brain–
All our fathers died to loose he shall bind again.
Here is nought at venture, random nor untrue
Swings the wheel full-circle, brims the cup anew.
Here is naught unproven, here is nothing hid:
Step for step and word for word–so the old Kings did!
Step by step, and word by word: who is ruled may read.
Suffer not the old Kings: for we know the breed–
All the right they promise–all the wrong they bring.
Stewards of the Judgment, suffer not this King !
There is anxiety in the ranks among the Democrats. I saw this reflected in a new report on some polling that was done in 2017. The poll came from the Democracy Fund Voter Study Group. The Democracy Fund was launched by the founder of eBay, and is a Leftist project. The Voter Study Group claims to be “nonpartisan,” but they are sociologists, so we know they are Leftists.
The research involved a k-means cluster analysis on the dataset to group the electorate using their prioritization of issues on a Likert scale, which allowed for a grouping of the electorate into five distinct voting “clusters.” In “Placing Priority,” these groups were named
Democrat/Independent Liberal Elites (DILE),
Democrat-Leaning Working Class (DLWC),
Moderate Younger Middle-Income (MYMI),
Conservative Younger (CY), and
Conservative Older (CO).
Each one of these groups, formed based on issue priorities rather than demographics, exhibited distinct political and ideological preferences.
Right off the bat I thought they had something really interesting. They used measures of attitudes and voting preferences to sort the data. They ended up with five groups, plus ten percent in a category called “Not Identified.” Do you see how they uncovered a natural division on the Democrat side between elites and working class? But on the Republican side, the divide is between older and younger voters.
The report expresses a great deal of distress because they did not find as much difference between the two Republican-voting groups as they found between the two Democrat-voting groups. In fact, the differences between the Conservative Younger and Conservative Older groups are inconsequential. Among the conservatives, the older voters are more interested in protecting Social Security and Medicare. The younger conservative voters are less interested in the social issues and could be characterized as a little bit libertarian.
They have little to say about that. Their focus is on the Democrat divisions. They are really concerned, because they see trouble on the horizon. Here is a key paragraph:
Hillary Clinton’s campaign, which had significant focus on climate change, racial and gender equality, and gay rights as important issues, was received positively by DILEs (nearly 97 percent of whom voted for Clinton). However, in the primary against Senator Bernie Sanders, she found herself defending the economic record of President Obama, which subsequently caused her to become the candidate of the status quo. Donald Trump — with his significant focus on trade deals, tax cuts, and bringing jobs home — more directly incorporated economic change into his overall campaign message, yielding a meaningful boost from DLWCs, a far larger cluster group by percent of the electorate. This magnified Trump’s appeal among the four clusters — DLWC, MYMI, CY, and CO — that ranked the economy and jobs as top issues. According to national exit poll data, among those voters who said the economy was “not so good,” Trump won an absolute majority over Clinton, 53 percent to 40 percent.
So the economy and jobs were priority issues for all voters except the Democrat-Elites.
All Republican candidates need to be running on a platform of needing the support of the people so that they can keep the Trump economy booming. That is how they can pull the “working-class Democrats” away from Leftist stupid stuff. Democrat Elites, of course, are a lost cause.
As are our own elites, but they are small numbers and concentrated in hopelessly blue states so that they don’t really matter.
The view from Never
Mona Charen wrote a column on this topic: https://ricochet.com/558866/a-word-on-behalf-of-religion/
Overall, I agree with Ms. Charen’s assessment. I am surprised that she is surprised. I am one of those “religiously observant Trump voters” who she apparently now agrees, based on the Elkins data, didn’t all of a sudden turn into a racist Nazi white supremacist Klansman. Rather, we made a transactional choice to support the President despite his flaws.
This is why guys like me have been so infuriated by the unfair and unsupported accusations of wrongdoing leveled by commentators like Ms. Charen.
Unfortunately, in this same column, her erroneous prejudice remains on display:
Organized religion has suffered the worst loss of reputation. In 1973, 65 percent of Americans expressed strong trust. That has declined to 38 percent in 2018.
The ongoing scandals involving sexual abuse in the Catholic Church have doubtless contributed to organized religion’s loss of standing. That some major evangelical leaders, like Robert Jeffress, Tony Perkins, and Jerry Falwell, Jr., have become shameless flacks for a cruel and immoral president has sullied their own reputations while giving the side eye to the faith that supposedly commands non-situational ethics.
Please don’t lecture me about the demands of the Christian faith. Ms. Charon seems clueless on the subject. There’s the whole “render unto Caesar” part. There’s the whole “in this world, but not of this world” part. It is far, far more complicated than she thinks. It certainly does not demand that we never associate with sinners. Quite the contrary.
The Jews and the Christians should share this understanding. Read the book of Daniel.
Further, the very Gallup survey that Ms. Charen cites does not remotely support her hypothesis, which attributes declining “strong trust” in organized religion to Trump. Let’s look at the numbers. The Gallup data is here (scroll down about halfway).
“Strong trust” in organized religion was 65% in 1965 and 38% in 2018. And this is supposedly Trump’s fault, or more precisely, the fault of religious leaders who supported Trump.
But it was down to 42% in 2015, before Trump. So no, it seems to have little or nothing to do with Trump.
I suspect that the decline doesn’t even have much to do with the Catholic Church scandals, but with the appalling degeneration of the morality of the Democrats. It is very difficult, these days, to be a religious believer and a Democrat, given the illegitimacy, abortion, and homosexuality issues. This is the growing cultural divide, so it is perfectly understandable that increasingly radical Democrats would express less support for organized religion.
This, incidentally, is precisely what the Elkins study cited by Ms. Charen says. (“Left-right culture wars over L.G.B.T. rights — particularly government sanction of same-sex marriages — have likely soured many Democrats’ views of Christians.”)
I write a weekly book review for the Daily News of Galveston County. (It is not the biggest daily newspaper in Texas, but it is the oldest.) My review normally appears Wednesdays. When it appears, I post the review here on the following Sunday.
By MARK LARDAS
Oct 2, 2018
“Red” Duke was known to millions for his televised broadcasts about medicine. He was one of those larger-than-life Texas characters who left people wondering if he was for real.
“I’m Dr. Red Duke,” a biography of Dr. James H. “Red” Duke, by Bryant Boutwell, provides the answer. Not only was he the real deal, but in many ways he was greater than his public persona.
Duke a native Texan, grew up in central Texas. He always took pride in being an Eagle Scout and an Aggie (he was a yell leader at Texas A&M). His Texas accent was authentic.
Although he planned to become an engineer, his career path changed many times. He studied to be a minister and then served as an armor officer in Germany. He finally settled on medicine after leaving the army. While finishing up his residency in Dallas, Duke was on duty at the trauma room when Kennedy was shot. Duke operated on Texas Gov. John Connolly that day, saving Connolly.
Duke went on to teaching medicine and did medical research on the East Coast before doing a two-year stint in a teaching hospital in Afghanistan. He came to Houston after his Afghanistan tour, joining the staff of the University of Texas Medical School at Houston in the late 1970s. He became one of their greatest teachers.
Among his other accomplishments, he helped start Houston’s Life Flight air ambulance service, pioneering rapid-reaction trauma surgery techniques. He became a television star, when UT used him as the spokesman for a series of medical advice programs. They became nationally syndicated and made him a household name.
Boutwell is well-positioned to write this book. He was a colleague of Duke, who worked with Duke for many years and knew him professionally and personally.
Boutwell presents Duke’s many strengths and virtues, but Boutwell also discusses Duke’s shortcomings, ones that led to two failed marriages and left Duke a prisoner of his celebrity.
“I’m Dr. Red Duke” is a focused and balanced look at one of the 20th century’s most extraordinary and talented surgeons. It is worth reading as a study in greatness.
Mark Lardas, an engineer, freelance writer, amateur historian, and model-maker, lives in League City. His website is marklardas.com.
In his 1990 book Life after Television, George Gilder predicted that the personal computer, then mostly boxes that sat on desktops and worked in isolation from one another, would become more personal, mobile, and be used more to communicate than to compute. In the 1994 revised edition of the book, he wrote. “The most common personal computer of the next decade will be a digital cellular phone with an IP address … connecting to thousands of databases of all kinds.” In contemporary speeches he expanded on the idea, saying, “it will be as portable as your watch and as personal as your wallet; it will recognize speech and navigate streets; it will collect your mail, your news, and your paycheck.” In 2000, he published Telecosm, where he forecast that the building out of a fibre optic communication infrastructure and the development of successive generations of spread spectrum digital mobile communication technologies would effectively cause the cost of communication bandwidth (the quantity of data which can be transmitted in a given time) to asymptotically approach zero, just as the ability to pack more and more transistors on microprocessor and memory chips was doing for computing.
Clearly, when George Gilder forecasts the future of computing, communication, and the industries and social phenomena that spring from them, it’s wise to pay attention. He’s not infallible: in 1990 he predicted that “in the world of networked computers, no one would have to see an advertisement he didn’t want to see”. Oh, well. The very difference between that happy vision and the advertisement-cluttered world we inhabit today, rife with bots, malware, scams, and serial large-scale security breaches which compromise the personal data of millions of people and expose them to identity theft and other forms of fraud is the subject of this book: how we got here, and how technology is opening a path to move on to a better place.
The Internet was born with decentralisation as a central concept. Its U.S. government-funded precursor, ARPANET, was intended to research and demonstrate the technology of packet switching, in which dedicated communication lines from point to point (as in the telephone network) were replaced by switching packets, which can represent all kinds of data—text, voice, video, mail, cat pictures—from source to destination over shared high-speed data links. If the network had multiple paths from source to destination, failure of one data link would simply cause the network to reroute traffic onto a working path, and communication protocols would cause any packets lost in the failure to be automatically re-sent, preventing loss of data. The network might degrade and deliver data more slowly if links or switching hubs went down, but everything would still get through.
This was very attractive to military planners in the Cold War, who worried about a nuclear attack decapitating their command and control network by striking one or a few locations through which their communications funnelled. A distributed network, of which ARPANET was the prototype, would be immune to this kind of top-down attack because there was no top: it was made up of peers, spread all over the landscape, all able to switch data among themselves through a mesh of interconnecting links.
As the ARPANET grew into the Internet and expanded from a small community of military, government, university, and large company users into a mass audience in the 1990s, this fundamental architecture was preserved, but in practice the network bifurcated into a two tier structure. The top tier consisted of the original ARPANET-like users, plus “Internet Service Providers” (ISPs), who had top-tier (“backbone”) connectivity, and then resold Internet access to their customers, who mostly initially connected via dial-up modems. Over time, these customers obtained higher bandwidth via cable television connections, satellite dishes, digital subscriber lines (DSL) over the wired telephone network, and, more recently, mobile devices such as cellular telephones and tablets.
The architecture of the Internet remained the same, but this evolution resulted in a weakening of its peer-to-peer structure. The approaching exhaustion of 32 bit Internet addresses (IPv4) and the slow deployment of its successor (IPv6) meant most small-scale Internet users did not have a permanent address where others could contact them. In an attempt to shield users from the flawed security model and implementation of the software they ran, their Internet connections were increasingly placed behind firewalls and subjected to Network Address Translation (NAT), which made it impossible to establish peer to peer connections without a third party intermediary (which, of course, subverts the design goal of decentralisation). While on the ARPANET and the original Internet every site was a peer of every other (subject only to the speed of their network connections and computer power available to handle network traffic), the network population now became increasingly divided into producers or publishers (who made information available), and consumers (who used the network to access the publishers’ sites but did not publish themselves).
While in the mid-1990s it was easy (or as easy as anything was in that era) to set up your own Web server and publish anything you wished, now most small-scale users were forced to employ hosting services operated by the publishers to make their content available. Services such as AOL, Myspace, Blogger, Facebook, and YouTube were widely used by individuals and companies to host their content, while those wishing their own apparently independent Web presence moved to hosting providers who supplied, for a fee, the servers, storage, and Internet access used by the site.
All of this led to a centralisation of data on the Web, which was accelerated by the emergence of the high speed fibre optic links and massive computing power upon which Gilder had based his 1990 and 2000 forecasts. Both of these came with great economies of scale: it cost a company like Google or Amazon much less per unit of computing power or network bandwidth to build a large, industrial-scale data centre located where electrical power and cooling were inexpensive and linked to the Internet backbone by multiple fibre optic channels, than it cost an individual Internet user or small company with their own server on premises and a modest speed link to an ISP. Thus it became practical for these Goliaths of the Internet to suck up everybody’s data and resell their computing power and access at attractive prices.
As a example of the magnitude of the economies of scale we’re talking about, when I migrated the hosting of my Fourmilab.ch site from my own on-site servers and Internet connection to an Amazon Web Services data centre, my monthly bill for hosting the site dropped by a factor of fifty—not fifty percent, one fiftieth the cost, and you can bet Amazon’s making money on the deal.
This tremendous centralisation is the antithesis of the concept of ARPANET. Instead of a worldwide grid of redundant data links and data distributed everywhere, we have a modest number of huge data centres linked by fibre optic cables carrying traffic for millions of individuals and enterprises. A couple of submarines full of Trident D5s would probably suffice to reset the world, computer network-wise, to 1970.
As this concentration was occurring, the same companies who were building the data centres were offering more and more services to users of the Internet: search engines; hosting of blogs, images, audio, and video; E-mail services; social networks of all kinds; storage and collaborative working tools; high-resolution maps and imagery of the world; archives of data and research material; and a host of others. How was all of this to be paid for? Those giant data centres, after all, represent a capital investment of tens of billions of dollars, and their electricity bills are comparable to those of an aluminium smelter. Due to the architecture of the Internet or, more precisely, missing pieces of the puzzle, a fateful choice was made in the early days of the build-out of these services which now pervade our lives, and we’re all paying the price for it. So far, it has allowed the few companies in this data oligopoly to join the ranks of the largest, most profitable, and most highly valued enterprises in human history, but they may be built on a flawed business model and foundation vulnerable to disruption by software and hardware technologies presently emerging.
The basic business model of what we might call the “consumer Internet” (as opposed to businesses who pay to host their Web presence, on-line stores, etc.) has, with few exceptions, evolved to be what the author calls the “Google model” (although it predates Google): give the product away and make money by afflicting its users with advertisements (which are increasingly targeted to them through information collected from the user’s behaviour on the network through intrusive tracking mechanisms). The fundamental flaws of this are apparent to anybody who uses the Internet: the constant clutter of advertisements, with pop-ups, pop-overs, auto-play video and audio, flashing banners, incessant requests to allow tracking “cookies” or irritating notifications, and the consequent arms race between ad blockers and means to circumvent them, with browser developers (at least those not employed by those paid by the advertisers, directly or indirectly) caught in the middle. There are even absurd Web sites which charge a subscription fee for “membership” and then bombard these paying customers with advertisements that insult their intelligence. But there is a fundamental problem with “free”—it destroys the most important channel of communication between the vendor of a product or service and the customer: the price the customer is willing to pay. Deprived of this information, the vendor is in the same position as a factory manager in a centrally planned economy who has no idea how many of each item to make because his orders are handed down by a planning bureau equally clueless about what is needed in the absence of a price signal. In the end, you have freight cars of typewriter ribbons lined up on sidings while customers wait in line for hours in the hope of buying a new pair of shoes. Further, when the user is not the customer (the one who pays), and especially when a “free” service verges on monopoly status like Google search, Gmail, Facebook, and Twitter, there is little incentive for providers to improve the user experience or be responsive to user requests and needs. Users are subjected to the endless torment of buggy “beta” releases, capricious change for the sake of change, and compromises in the user experience on behalf of the real customers—the advertisers. Once again, this mirrors the experience of centrally-planned economies where the market feedback from price is absent: to appreciate this, you need only compare consumer products from the 1970s and 1980s manufactured in the Soviet Union with those from Japan.
The fundamental flaw in Karl Marx’s economics was his belief that the industrial revolution of his time would produce such abundance of goods that the problem would shift from “production amid scarcity” to “redistribution of abundance”. In the author’s view, the neo-Marxists of Silicon Valley see the exponentially growing technologies of computing and communication providing such abundance that they can give away its fruits in return for collecting and monetising information collected about their users (note, not “customers”: customers are those who pay for the information so collected). Once you grasp this, it’s easier to understand the politics of the barons of Silicon Valley.
The centralisation of data and information flow in these vast data silos creates another threat to which a distributed system is immune: censorship or manipulation of information flow, whether by a coercive government or ideologically-motivated management of the companies who provide these “free” services. We may never know who first said “The Internet treats censorship as damage and routes around it” (the quote has been attributed to numerous people, including two personal friends, so I’m not going there), but it’s profound: the original decentralised structure of the ARPANET/Internet is as robust against censorship as it is in the face of nuclear war. If one or more nodes on the network start to censor information or refuse to forward it on communication links it controls, the network routing protocols simply assume that node is down and send data around it through other nodes and paths which do not censor it. On a network with a multitude of nodes and paths among them, owned by a large and diverse population of operators, it is extraordinarily difficult to shut down the flow of information from a given source or viewpoint; there will almost always be an alternative route that gets it there. (Cryptographic protocols and secure and verified identities can similarly avoid the alteration of information in transit or forging information and attributing it to a different originator; I’ll discuss that later.) As with physical damage, top-down censorship does not work because there’s no top.
But with the current centralised Internet, the owners and operators of these data silos have enormous power to put their thumbs on the scale, tilting opinion in their favour and blocking speech they oppose. Google can push down the page rank of information sources of which they disapprove, so few users will find them. YouTube can “demonetise” videos because they dislike their content, cutting off their creators’ revenue stream overnight with no means of appeal, or they can outright ban creators from the platform and remove their existing content. Twitter routinely “shadow-bans” those with whom they disagree, causing their tweets to disappear into the void, and outright banishes those more vocal. Internet payment processors and crowd funding sites enforce explicit ideological litmus tests on their users, and revoke long-standing commercial relationships over legal speech. One might restate the original observation about the Internet as “The centralised Internet treats censorship as an opportunity and says, ‘Isn’t it great!’ ” Today there’s a top, and those on top control the speech of everything that flows through their data silos.
This pernicious centralisation and “free” funding by advertisement (which is fundamentally plundering users’ most precious possessions: their time and attention) were in large part the consequence of the Internet’s lacking three fundamental architectural layers: security, trust, and transactions. Let’s explore them.
Security. Essential to any useful communication system, security simply means that communications between parties on the network cannot be intercepted by third parties, modified en route, or otherwise manipulated (for example, by changing the order in which messages are received). The communication protocols of the Internet, based on the OSI model, had no explicit security layer. It was expected to be implemented outside the model, across the layers of protocol. On today’s Internet, security has been bolted-on, largely through the Transport Layer Security (TLS) protocols (which, due to history, have a number of other commonly used names, and are most often encountered in the “https:” URLs by which users access Web sites). But because it’s bolted on, not designed in from the bottom-up, and because it “just grew” rather than having been designed in, TLS has been the locus of numerous security flaws which put software that employs it at risk. Further, TLS is a tool which must be used by application designers with extreme care in order to deliver security to their users. Even if TLS were completely flawless, it is very easy to misuse it in an application and compromise users’ security.
Trust. As indispensable as security is knowing to whom you’re talking. For example, when you connect to your bank’s Web site, how do you know you’re actually talking to their server and not some criminal whose computer has spoofed your computer’s domain name system server to intercept your communications and who, the moment you enter your password, will be off and running to empty your bank accounts and make your life a living Hell? Once again, trust has been bolted on to the existing Internet through a rickety system of “certificates” issued mostly by large companies for outrageous fees. And, as with anything centralised, it’s vulnerable: in 2016, one of the top-line certificate vendors was compromised, requiring myriad Web sites (including this one) to re-issue their security certificates.
Transactions. Business is all about transactions; if you aren’t doing transactions, you aren’t in business or, as Gilder puts it, “In business, the ability to conduct transactions is not optional. It is the way all economic learning and growth occur. If your product is ‘free,’ it is not a product, and you are not in business, even if you can extort money from so-called advertisers to fund it.” The present-day Internet has no transaction layer, even bolted on. Instead, we have more silos and bags hanging off the side of the Internet called PayPal, credit card processing companies, and the like, which try to put a Band-Aid over the suppurating wound which is the absence of a way to send money over the Internet in a secure, trusted, quick, efficient, and low-overhead manner. The need for this was perceived long before ARPANET. In Project Xanadu, founded by Ted Nelson in 1960, rule 9 of the “original 17 rules” was, “Every document can contain a royalty mechanism at any desired degree of granularity to ensure payment on any portion accessed, including virtual copies (‘transclusions’) of all or part of the document.” While defined in terms of documents and quoting, this implied the existence of a micropayment system which would allow compensating authors and publishers for copies and quotations of their work with a granularity as small as one character, and could easily be extended to cover payments for products and services. A micropayment system must be able to handle very small payments without crushing overhead, extremely quickly, and transparently (without the Japanese tea ceremony that buying something on-line involves today). As originally envisioned by Ted Nelson, as you read documents, their authors and publishers would be automatically paid for their content, including payments to the originators of material from others embedded within them. As long as the total price for the document was less than what I termed the user’s “threshold of paying”, this would be completely transparent (a user would set the threshold in the browser: if zero, they’d have to approve all payments). There would be no need for advertisements to support publication on a public hypertext network (although publishers would, of course, be free to adopt that model if they wished). If implemented in a decentralised way, like the ARPANET, there would be no central strangle point where censorship could be applied by cutting off the ability to receive payments.
So, is it possible to remake the Internet, building in security, trust, and transactions as the foundation, and replace what the author calls the “Google system of the world” with one in which the data silos are seen as obsolete, control of users’ personal data and work returns to their hands, privacy is respected and the panopticon snooping of today is seen as a dark time we’ve put behind us, and the pervasive and growing censorship by plutocrat ideologues and slaver governments becomes impotent and obsolete? George Gilder responds “yes”, and in this book identifies technologies already existing and being deployed which can bring about this transformation.
At the heart of many of these technologies is the concept of a blockchain, an open, distributed ledger which records transactions or any other form of information in a permanent, public, and verifiable manner. Originally conceived as the transaction ledger for the Bitcoin cryptocurrency, it provided the first means of solving the double-spending problem (how do you keep people from spending a unit of electronic currency twice) without the need for a central server or trusted authority, and hence without a potential choke-point or vulnerability to attack or failure. Since the launch of Bitcoin in 2009, blockchain technology has become a major area of research, with banks and other large financial institutions, companies such as IBM, and major university research groups exploring applications with the goals of drastically reducing transaction costs, improving security, and hardening systems against single-point failure risks.
Applied to the Internet, blockchain technology can provide security and trust (through the permanent publication of public keys which identify actors on the network), and a transaction layer able to efficiently and quickly execute micropayments without the overhead, clutter, friction, and security risks of existing payment systems. By necessity, present-day blockchain implementations are add-ons to the existing Internet, but as the technology matures and is verified and tested, it can move into the foundations of a successor system, based on the same lower-level protocols (and hence compatible with the installed base), but eventually supplanting the patched-together architecture of the Domain Name System, certificate authorities, and payment processors, all of which represent vulnerabilities of the present-day Internet and points at which censorship and control can be imposed. Technologies to watch in these areas are:
As the bandwidth available to users on the edge of the network increases through the deployment of fibre to the home and enterprise and via 5G mobile technology, the data transfer economy of scale of the great data silos will begin to erode. Early in the Roaring Twenties, the aggregate computing power and communication bandwidth on the edge of the network will equal and eventually dwarf that of the legacy data smelters of Google, Facebook, Twitter, and the rest. There will no longer be any need for users to entrust their data to these overbearing anachronisms and consent to multi-dozen page “terms of service” or endure advertising just to see their own content or share it with others. You will be in possession of your own data, on your own server or on space for which you freely contract with others, with backup and other services contracted with any other provider on the network. If your server has extra capacity, you can turn it into money by joining the market for computing and storage capacity, just as you take advantage of these resources when required. All of this will be built on the new secure foundation, so you will retain complete control over who can see your data, no longer trusting weasel-worded promises made by amorphous entities with whom you have no real contract to guard your privacy and intellectual property rights. If you wish, you can be paid for your content, with remittances made automatically as people access it. More and more, you’ll make tiny payments for content which is no longer obstructed by advertising and chopped up to accommodate more clutter. And when outrage mobs of pink hairs and soybeards (each with their own pronoun) come howling to ban you from the Internet, they’ll find nobody to shriek at and the kill switch rusting away in a derelict data centre: your data will be in your own hands with access through myriad routes. Technologies moving in this direction include:
This book provides a breezy look at the present state of the Internet, how we got here (versus where we thought we were going in the 1990s), and how we might transcend the present-day mess into something better if not blocked by the heavy hand of government regulation (the risk of freezing the present-day architecture in place by unleashing agencies like the U.S. Federal Communications Commission, which stifled innovation in broadcasting for six decades, to do the same to the Internet is discussed in detail). Although it’s way too early to see which of the many contending technologies will win out (and recall that the technically superior technology doesn’t always prevail), a survey of work in progress provides a sense for what they have in common and what the eventual result might look like.
There are many things to quibble about here. Gilder goes on at some length about how he believes artificial intelligence is all nonsense, that computers can never truly think or be conscious, and that creativity (new information in the Shannon sense) can only come from the human mind, with a lot of confused arguments from Gödel incompleteness, the Turing halting problem, and even the uncertainty principle of quantum mechanics. He really seems to believe in vitalism, that there is an élan vital which somehow infuses the biological substrate which no machine can embody. This strikes me as superstitious nonsense: a human brain is a structure composed of quarks and electrons arranged in a certain way which processes information, interacts with its environment, and is able to observe its own operation as well as external phenomena (which is all consciousness is about). Now, it may be that somehow quantum mechanics is involved in all of this, and that our existing computers, which are entirely deterministic and classical in their operation, cannot replicate this functionality, but if that’s so it simply means we’ll have to wait until quantum computing, which is already working in a rudimentary form in the laboratory, and is just a different way of arranging the quarks and electrons in a system, develops further.
He argues that while Bitcoin can be an efficient and secure means of processing transactions, it is unsuitable as a replacement for volatile fiat money because, unlike gold, the quantity of Bitcoin has an absolute limit, after which the supply will be capped. I don’t get it. It seems to me that this is a feature, not a bug. The supply of gold increases slowly as new gold is mined, and by pure coincidence the rate of increase in its supply has happened to approximate that of global economic growth. But still, the existing inventory of gold dwarfs new supply, so there isn’t much difference between a very slowly increasing supply and a static one. If you’re on a pure gold standard and economic growth is faster than the increase in the supply of gold, there will be gradual deflation because a given quantity of gold will buy more in the future. But so what? In a deflationary environment, interest rates will be low and it will be easy to fund new investment, since investors will receive money back which will be more valuable. With Bitcoin, once the entire supply is mined, supply will be static (actually, very slowly shrinking, as private keys are eventually lost, which is precisely like gold being consumed by industrial uses from which it is not reclaimed), but Bitcoin can be divided without limit (with minor and upward-compatible changes to the existing protocol). So, it really doesn’t matter if, in the greater solar system economy of the year 8537, a single Bitcoin is sufficient to buy Jupiter: transactions will simply be done in yocto-satoshis or whatever. In fact, Bitcoin is better in this regard than gold, which cannot be subdivided below the unit of one atom.
Gilder further argues, as he did in The Scandal of Money, that the proper dimensional unit for money is time, since that is the measure of what is required to create true wealth (as opposed to funny money created by governments or fantasy money “earned” in zero-sum speculation such as currency trading), and that existing cryptocurrencies do not meet this definition. I’ll take his word on the latter point; it’s his definition, after all, but his time theory of money is way too close to the Marxist labour theory of value to persuade me. That theory is trivially falsified by its prediction that more value is created in labour-intensive production of the same goods than by producing them in a more efficient manner. In fact, value, measured as profit, dramatically increases as the labour input to production is reduced. Over forty centuries of human history, the one thing in common among almost everything used for money (at least until our post-reality era) is scarcity: the supply is limited and it is difficult to increase it. The genius of Bitcoin and its underlying blockchain technology is that it solved the problem of how to make a digital good, which can be copied at zero cost, scarce, without requiring a central authority. That seems to meet the essential requirement to serve as money, regardless of how you define that term.
Gilder’s books have a good record for sketching the future of technology and identifying the trends which are contributing to it. He has been less successful picking winners and losers; I wouldn’t make investment decisions based on his evaluation of products and companies, but rather wait until the market sorts out those which will endure.
Gilder, George. Life after Google. Washington: Regnery Publishing, 2018. ISBN 978-1-62157-576-4.
Here is a talk by the author at the Blockstack Berlin 2018 conference which summarises the essentials of his thesis in just eleven minutes and ends with an exhortation to designers and builders of the new Internet to “tear down these walls” around the data centres which imprison our personal information.
This Uncommon Knowledge interview provides, in 48 minutes, a calmer and more in-depth exploration of why the Google world system must fail and what may replace it.
Like Water for Chocolate (1992) is a Mexican film directed by Alfonso Arau. The screenplay was written by Laura Esquivel, the author of the book on which the film is based (1989).
The style of the film is termed magic realism. This is often used to convey ideas about changes that should be made to traditions and social structures within a society. It contains magical happenings that are treated as if they are a normal part of real life. Even without knowing this, the film is beautiful in its own right. Magic Realism is often considered an art form, and this film is Art.
The changes being made in society around the place of women in society is the main theme of this film. Tita, the main character in the story, throws off family tradition and creates her own life, as does her sister, Gertrudis. Her oldest sister, Rosaura, follows the traditions of her family and society, and in the end this destroys her.
I found it interesting that when Tita and Pedro, her lover, come together, the consummation is too much for Pedro, and he dies of a heart attack. Tita poisons herself by eating matches. The house catches fire, and all is consumed, except Tita’s cook book, which is passed down to her grand-daughter. This could be symbolic of how great is the disruption to the old way of life the new ideas bring. It deeply affects Tita and Pedro, who are part of the change, but the new way becomes accepted and brings happiness to the younger women affected by it. The film is full of symbolism, and is certainly thought-provoking.
My film group enjoyed the film, and we had an interesting discussion around the main theme. The thought was expressed that it would be good to watch it for a second time, as there is so much in the story it was difficult to understand it all with just one viewing.
The film became the higest-grossing Spanish-language film ever released in the United States at that time. It grossed $21.6 million USD.
Kanye West is causing trouble for Lefty again. It all started when he said something nice about Candace Owens in the spring. Next thing you know, he was seen sporting a MAGA cap and saying good things about the president.
Apparently, he went off on a rant on last night’s Saturday Night Live, after the end of the broadcast, that was captured on video:
They bullied me backstage. They said “don’t go out there with that [MAGA] hat on.” They bullied me backstage. They bullied me!
Ninety percent of news is liberal. LA, New York, writers, rappers, musicians. So it’s easy to make it seem like it’s so, so, so one-sided.
KANYE SNL TALK THAT GOT CUT OFF FREEDOM OF SPEECH SHOULD HAVE EXTENDED pic.twitter.com/IpULoEJxsN
— MIKE DEAN! #MWA (@therealmikedean) September 30, 2018
Cracks are showing in the leftist wall.
The Left has been waging a war against reality for decades via postmodernism generally and constructivist epistemology in particular. Everyone knows the drill by now: sex is a social construct, race is a social construct, the blank slate.
It’s mostly been a rear-guard action so far but has lately moved out into the open. Since the Left sees that science is not on their side, it must be suppressed:
The opinion that science should be silenced, repressed, or ignored for political or perceived moral reasons exists at the highest levels in sociology.
As Naval notes,
The social sciences are at war with the physical sciences. https://t.co/HlzsEHQzyR
— Naval (@naval) September 30, 2018
I would have phrased it as “The social sciences are at war with the natural sciences” but that’s just a quibble. Further evidence along these lines is the suspension of hbdchick on Twitter for no apparent reason, possibly other than the fact that she’s counter the blank slate narrative. Fortunately, there are plenty of good people to support her, including the estimable Charles Murray:
— hbd chick 🐯 (@hbdchick) September 30, 2018
This is not the time to go wobbly. To hbdchick,