tag:blogger.com,1999:blog-108420632024-02-19T06:48:14.601-05:00[This Page Intentionally Left Blank]Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.comBlogger109125tag:blogger.com,1999:blog-10842063.post-2318531697089132712013-07-29T22:07:00.001-04:002013-07-31T22:11:54.786-04:00Music Boxers, Band Retrospectives<p dir="ltr">In the annals of music, there are a few bands that make a lasting impression. Emo-Metal legends Particle Decelerators have spent three decades leaving a mark like an armor-piercing bullet through a ham sandwich. Their first album, "Crushed Vervet" (1983), showcased their driving beats, screeching guitars, and morose lyrics, which noted Rock Beets critic James Snoofleburger described as sounding like "The Smiths on a Red Bull colada."</p>
<p dir="ltr">The band is fronted by the dynamically mopey Cruze Cahntral. Cahntral's eccentric vocals are backed by Elmer Elmerson's trademark untuned guitars, Vinnie Greengrocer's bass, and Gargantula's drums. Gargantula has one of the only home-made drum sets in professional music, and the uniqueness of the sound is evident in many of their tracks, especially when the supporting frames give way during a recording session.</p>
<p dir="ltr">Following on the heels of Vervet were "Colonoscopation" (1984) and "Budgerigargoyle" (1984), which featured the pugilistic quiet energy which launched them to superstardom. Their first world tour, from April 1985 to March 2007, was the group's first foray from their native Barstow. They returned briefly in 2011 to pick up a change of socks.</p>
<p dir="ltr">After a brief post-tour hiatus, Particle Decelerators released their fourth album, "Deflation", in 2013. While it lacked the high-adrenaline feel of their earlier work, the single "The Big Zip" rocketed up the adult contemporary charts, where it spoke to fans' arthritis and the attendant difficulty of closing pants over incontinence garments.</p>
<p dir="ltr">Enraged by the album's reception, Particle Decelerators disbanded, though there's already talk of thirtieth anniversary reunion tour.</p>
Michael Marshhttp://www.blogger.com/profile/02452030026125279631noreply@blogger.com0tag:blogger.com,1999:blog-10842063.post-11297807584614947992011-09-20T20:52:00.000-04:002011-09-20T20:52:23.801-04:00A Wake for a Bird<p>
The Holidays. Several weeks of worrying about travel, embarrassing relatives, forced conversations with people with whom you have nothing to talk about. Sure, there's some quality eating to be done, but after your end-of-year "vacation," you're looking forward to getting back to work, right?
</p>
<p>
OK, I get along great with my family, but this is the kind of lament that, if you haven't experienced it yourself, you know people who have, and do year after year. Wouldn't it be nice to have the good part of the holidays (that is, the food) without the obligations of family?
</p>
<p>
I propose a new annual tradition. Every year, friends should gather and have a huge meal. Thanksgiving turkey-with-all-the-trimmings minus the "Thanksgiving" part. Because every tradition needs something more than "that day we all stuff ourselves silly," my proposal is to hold a good old-fashioned wake. The guest of honor? Why, the deceased, of course. The reason we're all assembled. The turkey.
</p>
<p>
The organization of a wake is a personal thing, of course, but if I might make one suggestion, it would be for each diner to say a few words in the departed's honor. If each eulogy is accompanied by, say, a shot of whiskey, I certainly would not disparage. The whole idea is for everyone to enjoy the occassion, so have fun with it. Give the turkey a name, make up a back-story, share personal anecdotes. And don't worry if different people's stories are inconsistent.
</p>
<p>
So, when should this new holiday be held? Sometime between Thanksgiving and Christmas (or your solstice-adjacent holiday of choice or custom) would perhaps be ideal, as a lighthearted break from holidays steeped with long-held traditions of no real immediate relevance. That might not be practical, however, depending on your and your friends' travel plans. Besides, after Thanksgiving everyone is sort of burned out on turkey. A few weeks beforehand, however, and you can justify it as a Thanksgiving dress rehearsal. You might even get some interesting ideas for new dishes to add to your family's Thanksgiving, if you're willing to brave the silent or vocal scorn of your relatives, for whom it's just not Thanksgiving without the same menu as the last century of Thanksgivings. And that's almost reason enough to hold a Turkey Wake—new side dishes, a new kind of gravy, stuffing made with cornbread instead of regular bread; the possibilities are endless!
</p>
<p>
I hope that this year you'll hold a Turkey Wake, with as many friends as you can. And spread the word. Next year, I want to see a line of Hallmark Turkey Wake cards, tacky cardboard decorations in all the supermarkets, and Turkey-Wake-themed songs on the radio. The following year, I want to hear people complain, "It's not even Halloween, and <em>already</em> they're putting up the Turkey Wake decorations!" This thing is going to be huge.
</p>
<p>
Feel free to leave your own ideas, including for a better name than "Turkey Wake," in the comments.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com6tag:blogger.com,1999:blog-10842063.post-88234436768316781622011-07-20T07:37:00.000-04:002011-07-20T07:37:54.065-04:00Bullshit Update<p>
I'm still happy to take requests for long-form bullshitting here, but I'm also bullshitting on
<a href="https://plus.google.com/107504761170635132397/posts">Google+</a> in smaller, bite-sized pieces.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com0tag:blogger.com,1999:blog-10842063.post-40104735771609531962010-12-29T08:32:00.003-05:002010-12-29T08:35:44.169-05:00Testing some markup features<p>
This post has no real content of interest.
</p>
<div class="cryptoblog">
<p>
Ideally, this part should show up normally, though I've put it in its own <div> block.
</p>
</div>
<p>
If this is the second paragraph, then it didn't work.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-28567419713021641482010-12-27T17:45:00.001-05:002010-12-27T17:47:02.415-05:00Creating a Private Blog on a Free Blogging Service<p>
There are a few problems with Facebook (and similar services):
<ol>
<li>It's a walled garden</li>
<li>You have no control over your data (even though you think you do)</li>
<li>You're not the customer, you're the product</li>
</ol>
</p>
<p>
Free blogging sites get around problem 1, but not the other two.
Generally, you have even less control over your data, since the whole
point is to publish so that everyone in the world can potentially read
it. To get around all of these problems, you'd need to host your own
site, which can be a pain and costs more than it's worth to most
people.
</p>
<p>
So, what can we do with a free blogging site? We can post encrypted
articles, and only distribute the keys to the people we want reading
them. Not only have we removed problem 1, since anyone with the
appropriate crypto can read the articles, but we've also partially
removed problem 2. Why partially? I'll get to that in a bit. We
still have problem 3, but that's an economic reality for any free
service. You can, however, shop around for a service that treats you
as a product with dignity, at least, and you can potentially find a
paid blogging service that doesn't support encryption (or whose
encryption you don't want to use), at which point you become the
customer, and just a little more human in the eyes of the service.
</p>
<p>
Why might you not want to use a perfectly functional encryption
service provided by a blog host? It's a question of who has the keys.
It's almost certain that the host would have your encryption keys, and
would provide the encryption and decryption on the fly. While
convenient, it's still a loss of control, and they can hand your
decrypted data to anyone they choose (though you may have some
contract protections in this regard). It's also likely that they'll
use password-based authentication. We're going to use public-key
authentication, and we're going to do it in a way that's fairly easy
and robust againt forgotten passwords.
</p>
<p>
Let's consider the following scheme. You write a new article for your
semi-private blog. The bulk of this article (or maybe just a small
part of it) is a well-delimited block of ciphertext. Maybe it looks
like the following:
<pre>
BEGIN CRYPTOBLOG
Key: http://some.location/key_identifier
66fa53d9b7b04210a54853e406d7b119...
END CRYPTOBLOG
</pre>
We use special tags to denote the beginning and end of the special
contents. This is easy for a person to pick out visually, and is also
easy for a program to parse. The first line points to a URL with
keying information for this article. We'd expect many articles to use
the same key, since there's no reason not to. Keys should be changed
occasionally, to prevent certain attacks that come from large amounts
of available ciphertext, and when you want to deny someone who
previously had access to your articles access to any new ones. We'll
use a nice strong symmetric key encryption algorithm, such as AES-256.
</p>
<p>
We now have our encrypted article, how do we distribute the keys? The
simplest way to do this is through another blog post. We have one
key, but we want to make it available to a potentially large number of
people. Let's say each of them has an RSA public key. A simple way
to propagate the key is with a list of the following form:
<pre>
Alice E(Alice,key)
Bob E(Bob,key)
Charlie E(Charlie,key)
</pre>
Here the first column is the person's name, and the second is the key
encrypted with that person's public key. This isn't great, from a
privacy standpoint, because you've just transmitted the names of all
your friends. Slightly better is
<pre>
Pubkey(Alice) E(Alice,key)
Pubkey(Bob) E(Bob,key)
Pubkey(Charlie) E(Charlie,key)
</pre>
Now we haven't revealed anyone's name, but we've revealed their public
keys. This allows someone to correlate public keys between subsequent
AES keys, revealing the degree of churn in your list of friends.
Also, by publishing pairs of public keys and ciphertexts, you're
potentially giving an adversary a leg up in cracking the corresponding
private keys. Since just a smidge more paranoia costs us very little,
let's instead go with the following:
<pre>
H(Pubkey(Alice)|E(Alice,key)) E(Alice,key)
H(Pubkey(Bob)|E(Bob,key)) E(Bob,key)
H(Pubkey(Charlie)|E(Charlie,key)) E(Charlie,key)
</pre>
The first column is now a hash of the person's public key and the
ciphertext in the second column. Note that previously, your friend
could immediately recognize the appropriate line of keying material to
decrypt in order to retrieve the AES key. Now he or she has to
perform a simple hash based on each line until one of them matches.
The hash function doesn't have to be particularly great for this, so
we can use something simple like MD5 without worrying about security
or privacy being appreciably compromised.
</p>
<p>
What are our security and privacy properties now? Well, your
semi-private articles should be well protected by encryption, and your
friends should be able to recover the symmetric key. The identities
of your friends are protected, for the most part. What data does this
system leak, though?
<ol>
<li>The hosting service knows who's retrieving your posts, though not
who's successfully decrypting them.</li>
<li>The world in general knows how often you are posting.</li>
<li>The world in general knows how long your posts are.</li>
<li>The world in general knows <em>how many</em> people are able to
read your posts.</li>
</ol>
We could do better if we were self-hosted, but this is about the
limits of using a free service like Blogger. If you think you have a
way to reduce the amount of data leaked, please let me know.
</p>
<p>
That's the scheme, but how to implement it is another matter. We'd
like to have some way for someone to navigate to an article, and be
presented with a decrypted page. The easiest way to do this is
probably to create a Firefox extension. Note that this must be
written in javascript and CSS. The state of cryptography in
javascript isn't great, from what I've found poking around online. If
a person's public and private keys are loaded into the browser, then
the extension should be able to use them to decrypt first the
symmetric key and then the article. The extension should probably
cache the ciphertext (<em>not</em> the plaintext!) of the symmetric
key, since it'll likely be used multiple times. The URL identifies
the keys sufficiently at that point.
</p>
<p>
For most people, the public key is likely to be the most intimidating
part. Someone running Linux can easily create an RSA key using
OpenSSL. There's no need for a signed certificate. I don't know what
would need to be done on Windows. If the blogger is reasonably
crypto-savvy, then a BER- or DER-formatted RSA public key, an X.509
certificate, or a PGP/GPG certificate should be equally effective
mechanisms for relaying public keys. Generating the list of
ciphertexts for a new symmetric key will probably be done on the
command line. We'll worry about friendlier interfaces later.
</p>
<p>
A really nice feature of a scheme like this is that if one of your
friends forgets his private key password, he can just send you a new
public key and you can either email him the key ciphertexts or edit
the old postings to add the new public key's cipher.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com6tag:blogger.com,1999:blog-10842063.post-44100702622622302032010-06-12T15:22:00.002-04:002010-06-12T15:29:39.580-04:00Schwoops!<p>I'm drinking a bottle of tonic water, and I just noticed the following warning:</p>
<quote>
CONTENTS UNDER PRESSURE. CAP MAY BLOW OFF CAUSING EYE OR OTHER SERIOUS INJURY. POINT AWAY FROM FACE AND PEOPLE, ESPECIALLY WHILE OPENING.
</quote>
<p>
This leads me to believe that someone, somewhere, had this happen to them. Someone was twisting the cap off a bottle of tonic water, when the cap, straining like a bronco that had been drinking from an espresso-laced stream, exploded forth as a tiny missile of blindness-inducing plastic. Or perhaps the victim wasn't the person opening the bottle. Image the tragic scene. A young mother, a thirsty child. "Sure, you can have some tonic water." Then, tragedy. Now little Johnny will never play baseball again.
</p>
<p>
Maybe I'm wrong. The truth is, we may never know what prompted this warning, nor how much gin was involved.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com0tag:blogger.com,1999:blog-10842063.post-13176938233858262472010-02-09T06:43:00.002-05:002010-02-09T06:57:43.232-05:00This is Just Ridiculous<p>
We've had about 45" of snow since Friday, with another 10-20" predicted for today and tomorrow. Buffalo has had about 60" this season. <i>Buffalo</i>. We might get <i>more snow</i> than <i>Buffalo</i>.
</p>
<p>
I haven't lost power yet, but my parents were out for over 30 hours, and Pepco still reports over 12,000 customers who haven't yet had their power restored (down from over 100,000). The roads are plowed, though many not to their full width. The snowplow crews have worked incredibly long shifts, with little or no time for sleep. They've got nowhere to plow the snow, so they've had to haul it away.
</p>
<p>
At the rate roads have been getting cleared, it's going to take at least all day Thursday before they'll be passable again. That's assuming the road crews can pull the sorts of hours they have been. Oh, and the local governments have already pretty much exhausted their snow-removal budgets for the year.
</p>
<p>
The next front looks like it'll pass to our south, dumping rain (and some wintery mix) on the South/Southeast from Texas to Florida. There's another one up in the Northwest, though. I have no idea what direction that one's going to go.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com1tag:blogger.com,1999:blog-10842063.post-72205381010673476162009-06-05T18:42:00.002-04:002009-06-05T19:12:22.133-04:00What is Wrong with Electronics Manufacturers?<p>
I currently have a clock radio and an answering machine that are driving me crazy. We've just started thunderstorm season, so I've had a few opportunities to lose power for extended periods of time. Neither of these gadgets performs what I'd consider well during these events.
</p>
<p>
The worse is the clock radio. It doesn't have a battery backup, just a capacitor. When I lose power for more than, say, thirty seconds, I lose the time, the alarm settings, and all of the station presets. I have another clock radio that <i>does</i> have a battery backup, but it has an analog tuner and no presets, and the clock tends to run fast on the battery.
</p>
<p>
The answering machine has battery backup, which lasts for a few hours. If the outage is too long, however, it too loses the time, but it also loses the outgoing and <i>incoming</i> messages. Yes, any messages that were stored on the machine are now gone.
</p>
<p>
Now, I've had both of these for awhile. The answering machine is from the mid-90s, and the clock is from 2001 or 2002. So I've been considering replacing them.
</p>
<p>
The thing that I find maddening is that, in 2009, clock radios <b>still don't use non-volatile solid state memory</b> to record their settings. The closest I've been able to find, in a form factor appropriate for my nightstand, is an Oregon Scientific weather radio. It uses non-volatile storage for settings, and even gets the time signal from the atomic clock in Colorado. It doesn't have a normal AM/FM tuner, though, only the weather stations.
</p>
<p>
Answering machines are no better. There's one model from AT&T that seems to have non-volatile settings. If you have caller ID an incoming call will even reset the time after an outage.
</p>
<p>
How much memory do you need to store settings and messages? Settings take almost nothing, the cheapest thumb drive would serve adequately. For a clock, it's 3 bytes per alarm setting, 4 if you want to specify on which days of the week the alarm should be active. A radio station is 1 byte. Voice recording takes substantially more, but still not ridiculous amounts. Yes, there are devices out there that have non-volatile storage, but seriously, <i>one</i> of each type?
</p>
<p>
One thing I've noticed, looking at clock radios online, is that they're either bare-bones pieces of garbage, or they can dock an iPod and produce concert-hall-like sound. Really? For an <i>alarm clock</i>? An alarm clock has a pretty simple function: to keep track of the time, wake you up when you've told it to, and do all of this with as small a footprint as possible. You would never know it from what's on the market today.
</p>
<p>
Answering machines almost seem to have been written off completely by their manufacturers. I don't get it. Voice mail is under someone else's control. (No, the irony of posting this on a blog controlled by Google isn't lost on me.) Voice mail can't tell you if your power's still out. Most answering machines these days are remotely controllable, and you don't have to remember a special number to call. You can walk through your door, look right at your answering machine, and know immediately if you have any messages. (Well, unless your power went out and your machine dumped all of them.) Mine has a number: "Hey, here's how many messages are waiting for you!" though I know some just have a little blinking light.
</p>
<p>
I guess what I'm really trying to say here is, can anyone recommend a good clock radio or answering machine with non-volatile storage?
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com6tag:blogger.com,1999:blog-10842063.post-20616839608622294742009-01-17T10:22:00.002-05:002009-01-17T10:29:06.860-05:00Quite Possibly the Funniest Spam I've Received<blockquote>
From: FBI Director Robert S.Mueller <kelvin.williams@info.net><br />
Reply-to: kelvinwilliams24@gmail.com<br />
To: undisclosed-recipients<br />
Date: Fri, Jan 16, 2009 at 4:41 PM<br />
Subject: FBI Director Robert S.Mueller<br />
<br />
Attn: Beneficiary,<br />
<p>
This is to Officially inform you that it has come to our notice and we have thoroughly Investigated with the help of our Intelligence Monitoring Network System that you are having an illegal Transaction with Impostors claiming to be Prof. Charles C. Soludo of the Central Bank Of Nigeria, Mr. Patrick Aziza, Mr Frank Nweke, none officials of Oceanic Bank, Zenith Banks, kelvin Young of HSBC,Ben of Fedex,Ibrahim Sule,Larry Christopher, Puppy Scammers are impostors claiming to be the Federal Bureau Of Investigation. During our Investigation, we noticed that the reason why you have not received your payment is because you have not fulfilled your Financial Obligation given to you in respect of your Contract/Inheritance Payment.
</p>
<p>
Therefore, we have contacted the Federal Ministry Of Finance on your behalf and they have brought a solution to your problem by cordinating your payment in total USD$11,000.000.00 in an ATM CARD which you can use to withdraw money from any ATM MACHINE CENTER anywhere in the world with a maximum of $4000 to $5000 United States Dollars daily. You now have the lawful right to claim your fund in an ATM CARD.
</p>
<p>
Since the Federal Bureau of Investigation is involved in this transaction, you have to be rest assured for this is 100% risk free it is our duty to protect the American Citizens. All I want you to do is to contact the ATM CARD CENTER via email for their requirements to proceed and procure your Approval Slip on your behalf which will cost you $110.00 only and note that your Approval Slip which contains details of the agent who will process your transaction.
</p>
<p>
CONTACT INFORMATION<br />
NAME: Kelvin Williams<br />
EMAIL: kelvinwilliams24@gmail.com<br />
</p>
<p>
Do contact Mr. Kelvin Williams of the ATM CARD CENTRE with your details:<br/>
<br/>
FULL NAME:<br />
HOME ADDRESS:<br />
TELL:<br />
CELL:<br />
CURRENT OCCUPATION:<br />
BANK NAME:<br />
</p>
<p>
So your files would be updated after which he will send the payment informations which you'll use in making payment of $110.00 via Western Union Money Transfer or Money Gram Transfer for the procurement of your Approval Slip after which the delivery of your ATM CARD will be effected to your designated home address without any further delay.
</p>
<p>
We order you get back to this office after you have contacted the ATM SWIFT CARD CENTER and we do await your response so we can move on with our Investigation and make sure your ATM SWIFT CARD gets to you.
</p>
<p>
Thanks and hope to read from you soon.
</p>
<p>
FBI Director Robert S.Mueller III.
</p>
<p>
Note: Do disregard any email you get from any impostors or offices claiming to be in possesion of your ATM CARD, you are hereby adviced only to be in contact with Mr. Kelvin Williams of the ATM CARD CENTRE who is the rightful person to deal with in regards to your ATM CARD PAYMENT and forward any emails you get from impostors to this office so we could act upon and commence investigation.
</p>
</blockquote>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com3tag:blogger.com,1999:blog-10842063.post-62245729394780046212008-12-27T10:19:00.002-05:002008-12-27T11:31:30.954-05:00So Close...<p>
British Culture Secretary Andy Burnham wants to <a href="http://www.telegraph.co.uk/scienceandtechnology/technology/technologynews/3965051/Internet-sites-could-be-given-cinema-style-age-ratings-Culture-Secretary-says.html">apply movie-style ratings to websites</a>.
His plan is to have major ISPs provide child-friendly services based on these ratings.
He's getting close to a good idea, but he's not quite there.
</p>
<p>
He also begins with a false premise:
<blockquote>
“It worries me - like anybody with children,” he says. “Leaving your child for two hours completely unregulated on the internet is not something you can do."
</blockquote>
Leaving your child for two hours completely unregulated on the internet is not something you <em>should</em> do. You shouldn't leave your child for two hours to watch television unsupervised, either.
</p>
<p>
Here's the problem. You're going to try to separate out websites that are child-friendly, or age-range friendly, from other sites. Trying to do this via government regulation is doomed to failure. What if the content of a site changes? What about sites where comments are allowed? Take a site like <a href="http://blogs.discovermagazine.com/badastronomy/">Bad Astronomy</a>, run by Dr. Phil Plait. Phil generally keeps it PG, if not G, but very occassionally he'll slip in some saltier language. The commenters do, too, but are generally good. What rating do you give this site? Who is going to validate the ratings that sites are given?
</p>
<p>
Another problem is that you're pushing the enforcement (at least partially) onto the ISPs. If they have to provide different levels of service, that involves either redundant networking or filters that run on all traffic, based on the subscriber. The redundant networking might be the cheaper option, since it doesn't require a lookup over a possibly-sparse set of subscribers for every packet or session. Plus, at the ISP level, you're probably going to be stuck with a pared-down internet or no filtering. That means keeping your children "safe" locks you out of quite a number of useful sites, even if the kids aren't even in the house.
</p>
<p>
There's a market solution here, and it could be implemented fairly easily without any government regulation or intervention. I call it <b>.ratedg</b>, or for the more network-geeky of you out there, <b>RATEDG-DOM</b>. The idea is that a new top-level domain (TLD) is created, where the sites are vetted initially and periodically for standards of content. On end-user computers, optional filtering software would be installed that only allows connections to sites in the .ratedg TLD. Traffic to other TLDs, or to numeric IP addresses, would be blocked. This isn't completely <em>trivial</em>, since all connections have to be addressed numerically, but a local DNS cache could handle this.
</p>
<p>
The TLD would be maintained by a nonprofit organization, which is funded by the fees paid by sites wishing to be listed. Some accommodation would need to be made for sites of nonprofits, hobbyists, and other cash-short groups. The fees could, for instance, be determined site-by-site based on the website's circumstances. This adds complexity, of course, but is not insurmountable.
</p>
<p>
The filtering could be provided by free software (funded by governments, the nonprofits, or volunteers), and disabled by password so that adults can have less-fettered access. One drawback of this is that software-based filters are notoriously susceptible to circumvention by clever youngsters. Of course, you're not letting your kids surf unsupervised, are you? The filter provides you with a no-accidental-bad-stuff net. You see the "Rated G" certification immediately, and if you click on a .com, .edu, .org, or whatever link by mistake, the filter blocks it for you with a friendly warning.
</p>
<p>
Another option, perhaps better for parents who insist on letting their children use the internet unsupervised, is a hardware filter. This would be inserted into your computer either between the network interface card and the wire, or between the card and the rest of the system (the latter is probably better). Filtering is now physically enforced by a key, which the parents can carry along with them. The case would have to be locked, as well, to keep the filter card from being removed.
</p>
<p>
This system also has extensibility. A <b>RATEDPG-DOM</b> could be created as well, or TLDs corresponding to other countries' standards. A hierarchy of allowed TLDs would arise naturally: a filter set for PG websites would allow both .ratedpg and .ratedg.
</p>
<p>
Note also that this would not force sites out of other TLDs that are otherwise descriptive. We already have websites that are in both, say .com and .co.uk. Having disney.ratedg would not preclude the same site being available via disney.com, though Disney would probably maintain pieces of its website other-than the G-rated portion.
</p>
<p>
Enforcement places some burden, but again the registration fees help fund this. It isn't feasible to completely verify a site's content, certainly not with any great frequency, but a combination of random compliance checks and public problem reporting can have great impact. If, say, Goggle contributes some of its resources to compliance monitoring, a much more complete picture could be obtained.
</p>
<p>
There are potential problems with this solution, as there are with any solutions.
Filtering based on TLD punishes sites that do not or cannot register, and students who need access to information on non-registered sites. <a href="http://www.si.edu">The Smithsonian Institution</a> comes to mind, since there's likely to be photos of art that some would consider inappropriate for children. As the popularity of .ratedg grows, non-registered but compliant sites would feel pressure to register. Other sites might re-structure their content into G-rated and non-G-rated components, on separate IP addresses (though not necessarily different hosts). Still, other volunteer-run educational but not specifically child-oriented would likely be excluded. I'm sure there are other potential problems as well.
</p>
<p>
So that's my suggestion. It's an opt-in filtering system, both on the user and content provider ends. ISPs don't need to add or modify infrastructure. Governments don't need to add regulation or oversight. At-home implementation could be done by either hardware or software. The system is extensible. Implementation can be phased in, and some of the technical design could precede full implementation (such as prototype software that filters on .org or .edu). Since it doesn't require a strong-arm approach or extensive new infrastructure, the whole system could probably be implemented and deployed in under a year.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-25135952646859493562008-12-25T09:43:00.002-05:002008-12-25T09:52:26.134-05:00Happy Newtonmas!<p>For someone who's 366, he's holding up pretty well. Sure, he doesn't do so well with very heavy objects and can't move too quickly, but he still puts in a fairly reliable showing.</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com0tag:blogger.com,1999:blog-10842063.post-71808012248200846002008-12-07T13:28:00.002-05:002008-12-07T13:42:50.986-05:00The Natural<p>
There's currently a lawsuit filed that claims President-Elect Barack Obama is not eligble to be President because his father being Kenyan means Obama isn't a natural born citizen, as required by the Constitution. The case (on appeal to the Supreme Court, which is not likely to be hear it) hinges on the fact that "natural born citizen" never seems to have been defined. It would, in a way, be nice for the Supreme Court to weigh in on this, for the sake of precedent.
</p>
<p>
Here's what I'd consider a reasonable set of criteria to be eligible for the Presidency:
<ul>
<li>Either:
<ol><li>at least one parent was a U.S. citizen at time of birth; or</li>
<li>the person was born in the United States of America (yes, I'm excluding territories, but not embassies).</li>
</ol>
</li>
<li>The person does not currently hold citizenship for any country other than the United States of America.</li>
<li>If the person has the right to citizenship of any other country by birth or circumstance, that right must be alienated.</li>
</ul>
</p>
<p>
What I find particularly interesting is that all of these criteria could be established by a Supreme Court ruling in regards to President-Elect Obama's eligibility.
</p>
<p>
Feel free to weigh in. Abusive comments will be deleted. Links to informative sites are welcome, but comments linking to propaganda (on whatever side) will be deleted. Yes, I get to decide where the line is between "informative" and "propaganda", but then it's my blog. Blogger hands them out for free, so go ahead and start your own if you disagree. I'll keep deleted comments available for re-posting if you want to try to convince me that something shouldn't have been deleted.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com7tag:blogger.com,1999:blog-10842063.post-86770238110495687862008-11-21T20:38:00.003-05:002008-11-21T20:55:26.268-05:00A Metaphor for Our Times<p>
I've been watching Mayor Booker (of "luxuriating in our deliciousness" fame) (and Newark) on the Colbert Report. Oh, and drinking homebrew. OK, the "Newark" part isn't fame so much as, well, that's where he's Mayor.
</p>
<p>
That's not my point, though. He was comparing America to a somehow-delicious symphony, among other things. It struck me that this isn't the "deliciousness" metaphor. Nor is the currently popular "tossed salad" metaphor of modern America. Face it, when is the last time you luxuriated in the deliciousness of a tossed salad? And how many of you chuckled when you read "tossed salad"?
</p>
<p>
No, my fellow Americans, I have a new metaphor for America. And it's one that we can all agree practically epitomizes deliciousness.
</p>
<p>
America is a banana split.
</p>
<p>
We've got chocolate and vanilla ice cream. We already understand that part of it. We've got bananas, which are yellow, or at least yellow-ish. Close enough, say I. Maraschino cherries are red (Hey, I didn't come up with the label. I'm a uniter, here.), as is strawberry ice cream, if that's your thing.
</p>
<p>
Now, I know what you're saying. "All that's left are whipped cream (whiter than vanilla) and hot fudge (which is more chocolate). Isn't that rather glaringly omissive?"
</p>
<p>
To that I reply, caramel sauce is just as delicious. Just make the chocolate ice cream double-chocolate or chocolate fudge, and you'll never miss the hot fudge. Trust me. Butterscotch is pretty delicious on a banana split, too.
</p>
<p>
Where am I going with this? I could really go for a banana split, and I'd wager <strike>many</strike>both of you could, too. And when you're eating that banana split, luxuriating in its deliciousness, give a thought to the deliciousness that is our National Banana Split.
</p>
<p>
On a final note, which is eerily synchronicitous, Thomas Friedman is currently on the Report re-broadcast, and he kind-of looks like a dollop of whipped cream.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-22444950648272158622008-11-09T12:32:00.002-05:002008-11-09T12:35:44.708-05:00The Policy Here is to Aim the Cointreau at the Peach<p>
<a href="http://www.youtube.com/watch?v=0poi3sIkSa8">This</a> popped into my head for no good reason today, and I thought I'd share.
<object width="425" height="344"><param name="movie" value="http://www.youtube.com/v/0poi3sIkSa8&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/0poi3sIkSa8&hl=en&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="344"></embed></object>
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com4tag:blogger.com,1999:blog-10842063.post-38195214430658353212008-10-29T18:53:00.003-04:002008-10-29T18:55:22.216-04:00Very Poor Housekeeping<p><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdunkodKBmTzjGDvinXOxmTbSnts_pjmRyD1EQwkq5umMxePfbkGlWzphHBv3oQE3tbjeVq59bJWTmyxSYZoBtZEV6McNTv6EOb2J7AXf4QyjjyF48Fc6DYnJqTOyFDhS_339r/s1600-h/halloween.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 240px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdunkodKBmTzjGDvinXOxmTbSnts_pjmRyD1EQwkq5umMxePfbkGlWzphHBv3oQE3tbjeVq59bJWTmyxSYZoBtZEV6McNTv6EOb2J7AXf4QyjjyF48Fc6DYnJqTOyFDhS_339r/s320/halloween.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5262713036730288306" /></a>
I think my house spiders are developing an attitude. And, if I'm not mistaken, a taste for human blood.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-60729133621619632272008-10-28T22:08:00.005-04:002008-10-28T22:20:38.278-04:00Ballot Questions in Montgomery County, MD<p>
This year there are two statewide ballot questions and two county ballot questions. Of these, Ballot Question A is the least clear, so here's some background information.
</p>
<p>
The following excerpts of the County Charter with editorial remarks are © 2008 <a href="http://www.amlegal.com/nxt/gateway.dll/Maryland/montgom/partithecharternote/charterofmontgomerycountymaryland?f=templates$fn=document-frame.htm$3.0">American Legal Publishing Corporation</a>:
<blockquote>
<p>
Sec. 311A. Limitations on Expenditures for Landfills in Residential Zones.
</p>
<p>
No expenditure of County funds shall be made or authorized for the operation of a landfill system of refuse disposal on land zoned for residential use. (Election of 11-7-78.)
</p>
<p>
Editor's note—See East v. Gilchrist, 296 Md. 368, A.2d 285 (1983); holding section 311A cannot be given effect under circumstances involving an order of the secretary of health and mental hygiene and requirement of local funding under public general law.
</p>
<br/>
<p>
Sec. 311B. Limitations on Expenditures, Contracts, and Permits for Burying or Trenching Sewage Sludge in Residential Zones.
</p>
<p>
No expenditure of County funds shall be made or authorized for the construction or operation of a system for burying or trenching sewage sludge on land zoned for residential use, nor may the County purchase or contract for the service of burying or trenching sewage sludge on land zoned for residential use. Also, the County may not seek federal or state permits for the burying or trenching of sewage sludge in residential zones. (Election of 11-4-80.)
</p>
<br/>
<p>
Sec. 313A. Purchasing, Contracting for Goods, Services with C&P Telephone Company.
</p>
<p>
The County Government may not purchase and contract for goods and services with the C&P Telephone Company (C&P) unless C&P includes telephone subscribers in Gaithersburg, Maryland, and Montgomery Village in the Washington Metropolitan Area Telephone Exchange (MET) at local rates no higher than local rates charged MET subscribers in Bethesda, Silver Spring, Kensington and Rockville telephone exchange areas. (Election of 11-2-82.)
</p>
<p>
Editor's note—In Rowe, et al. v. The Chesapeake and Potomac Telephone Company of Maryland, et al., 65 Md. App. 527, 501 A.2d (1985), it was held that Charter section 313A could not be given effect because it conflicted with a state Public Service Commission Order.
</p>
</blockquote>
</p>
<p>
<a href="http://www.lwvmd.org/mont/vggen08ballotques.html">The League of Women Voters</a> has a discussion of all four ballot questions, including (in part) the following on Question A:
<blockquote>
<b>Present Practice</b> – The County Charter provides a framework for the governance of the county. Three provisions in the County Charter: 311A, 311B, and 313A currently have no legal force and do not affect how county government operates. The Maryland courts blocked implementation of 311A and 313A because each directly conflicted with some aspect of state law. More fundamentally, neither of these provisions are proper “Charter Material” because they do not address a fundamental aspect of the form and basic structure of county government. In addition, they attempt to legislate through a charter amendment, which the Maryland Constitution prohibits. Although the Maryland courts have not blocked the operation of 311B, a consistent line of Court of Appeal opinions makes clear that this provision, like the ones above, is in conflict with the Maryland Constitution’s prohibition on legislating through a charter amendment. </blockquote>
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-63515377582080424652008-10-25T17:22:00.001-04:002008-10-25T17:24:47.121-04:00Quite Possibly the Funniest Spam Message I've Ever Received<p>
<pre>
From: root@s119.evanzo-server.de (Cron Daemon)
To: root@s119.evanzo-server.de
Subject: Cron <root@s119> /etc/webmin/sysstats/sysstats.pl
X-Cron-Env: <SHELL=/bin/sh>
X-Cron-Env: <HOME=/root>
X-Cron-Env: <PATH=/usr/bin:/bin>
X-Cron-Env: <LOGNAME=root>
WARNING (eval)(disk.pl 176) : ERROR while updating i3.rrd: opening 'i3.rrd': No such file or directory
</pre>
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com0tag:blogger.com,1999:blog-10842063.post-757717269904968672008-10-22T17:52:00.001-04:002008-10-22T17:53:25.319-04:00Be Young And Beautiful Forever, Or At Least For Twenty Years!<p>
<b>Defy ageing the natural way!</b> Take up to <b>20
years</b><sup>†</sup> off your appearance with
the <b>age-defying</b> secret of flaxseed! But realistically no more
than that! Ageing is as inescapable as the shifting sands of the
Sahara, where the Riffian people of the Atlas Mountains have
been <b>defying the ravages of age</b> for millennia by harnessing the
cosmetic power of flaxseed!
</p>
<p>
For over two centuries, travelling salesmen have been
selling <b>age-defying</b> cosmetics made from flaxseed and flaxseed
by-products to passengers on the trains criss-crossing North Africa!
And now this <b>practically age-obliterating</b> (up to about 20
years<sup>†</sup>) miracle has crossed the ocean! And it's
available now! For you! To purchase!
</p>
<p>
Cosmetological Scientists agree that nothing <b>defies ageing</b> like
<b>LinumOleum™</b>'s <b>FlaxTastic™</b> line of cosmetics!
The Omega-3 fatty acids restore your skin's natural shine, while the
hydrogen cyanide <b>gives Father Time the middle finger!</b> It's
like a <b>facelift in a bottle!</b> And over 20
years<sup>†</sup> it will cost you less than the Blue Book
value of a 1963 bison!
</p>
<p>
So order now! At LinumOleum™, we guarantee that you'll love
our <b>FlaxTastic™</b> line of <b>age-bludgeoning</b> flaxseed,
flaxseed by-product, and flaxseed-adjacent cosmetic products, or some of
your money back! Look <b>20 years<sup>†</sup> younger</b> today!
</p>
<p style="font-size: xx-small">
<sup>†</sup> LinumOleum™ makes no claims of medical or
cosmetological efficacy for its FlaxTastic™ line of products.
LinumOleum™ is not responsible for injuries or cyanide poisoning
resulting from use of its FlaxTastic™ line of products.
Continued use of FlaxTastic™ products for longer than 20 years
is likely to result in your face falling off.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-78552107292395678882008-10-20T17:56:00.003-04:002008-10-20T18:28:17.521-04:00The Past 32 Hours<p>
Yesterday morning, I was mowing my lawn. This was quite the endeavor, since it had been a couple of weeks, the weather was good for growth, and I have a <a href="http://mamarsh.blogspot.com/2007/04/idiot-not-included.html">push-reel mower</a>. This meant that instead of my usual mowing each row twice (up and back), I had to mow each four times, the first pass being substantial effort.
</p>
<p>
I'd finished the front, which is the worst part of my yard, mower-wise, and started mowing the side. The side is a bit of a pain, since it's on a slope, but it's small, so it's not generally that bad. As I'm pushing the mower up and back, I glance at one of my basement windows. And see a squirrel looking out at me.
</p>
<p>
Of course, I immediately cease mowing, and go inside. After pounding on the basement door a few times, I open it, turn on the stairway light, and close the door behind me. The squirrel is still sitting in the window, trying in vain to get out. I open another window, and it immediately runs over to it, but neglects to jump up to flee to safety. I figure that the window's too high for the squirrel to reach (a fact belied by the signs of gnawing I later notice), and stack a couple of boxes by the window. The squirrel won't go back, though.
</p>
<p>
At this point, the squirrel is, so I think, behind my TV and stereo setup, so I start looking around the basement to survey the damage (which at the moment seems minimal). That's when I see something that doesn't look right. There's a hole in the wall, through which I can see daylight. It's clearly a hole that was created by a human being. Not yet sure what the hole's for, I notice the dryer exhaust hose lying partially coiled behind the dryer.
</p>
<p>
I continued my survey of the basement, and find no sign of the squirrel. Now, I'm hoping that it found a way out while my back was turned. I close the window and go outside to take a look at the hole. It's behind a big plastic mini-shed that holds my garbage cans to keep the raccoons out. I see the remains of the vent hood, but no sign of the pieces of plastic that were formerly part of it. Given its placement behind the shed, I'm not sure how long it was like that. It could easily have been in that condition when I had the house inspected prior to purchase, though I'd hope the home inspector was more diligent than that.
</p>
<p>
The rest of the day was squirrel-dominated. After finishing the lawn, I went to Home Depot to pick up a new vent cover. While getting advice from the retired plumber working in that section, another customer (who was waiting to ask a question) ventured her own opinion. She claimed the plastic vent covers were useless, and that squirrels would just chew through them again. Of course, the store had nothing better. She finally asked her question, and was on her merry way, so I asked the plumber, "What would you use?" He didn't put much stock in the woman's claims, which are really probably more relevant if the squirrels have nested in the house, so I made my purchase and left.
</p>
<p>
Of course, with the current temperatures, it's not the best time to try getting caulk to set, but needs must win out, so my new cover is slowing sealing itself to the outside wall. However, I'm getting ahead of myself. After home depot I went over to Marco's to keg our latest batch of <a href="http://36pints.blogspot.com/2008/10/its-been-awhile.html">Winky Dink Marzen</a>. <em>Then</em> I came home to replace the vent cover, which remains un-gnawed.
</p>
<p>
The day's manual labor done, I went over to my parents' house to borrow a squirrel trap. I didn't think the squirrel was still inside, but better safe than sorry. After baiting it with peanut butter, I called it an evening.
</p>
<p>
This moring, after getting ready for work, I went down to the basement again to check on the trap. I didn't get that far, though, because I could see the squirrel sitting at what it must have come to regard as <em>its</em> window. I opened a window, but it wouldn't budge. Figuring noise would stir it, I turned on the stereo and played NPR's pledge drive at high volume. That got it moving. Not to the open window, though. It was away from its window, however, so I opened that one as well.
</p>
<p>
There's a particular state of mind, helped along by wanting to get to work, that causes you to try to reason with a squirrel. It, however, was being thoroughly unreasonable. Fed up, I moved the trap into the finished part of the basement, close off the doors to keep it from going back to the laundry or furnace rooms, and left for work.
</p>
<p>
Knowing there's a squirrel in your house, trapped with your 42" flat-panel TV among other electronics, can make it difficult to focus on your work. I soldiered on, though, and put in a good innings. By the end of the day, however, the stress had my stomach a bit twisted.
</p>
<p>
Once home, I put on some old clothes (what I used yesterday to mow the lawn), a denim jacket, and a pair of reasonably thick gloves. Then I ventured into the basement. Sitting patiently in the trap was the squirrel. It didn't object when I approached, and only slightly when I lifted the trap and carried it up the stairs and outside. Outside—that was something it recognized, and became considerably more animated. I set the trap on the ground, with the door facing the large tree in my back yard, and carefully openened the trap. Squirrels can be, well, squirrelly, so I was prepared for it to view me as its foe rather than its liberator. No such occurrence, though, as it flew from the trap and up the tree.
</p>
<p>
I am now relaxing in an ostensibly squirrel-free house, enjoying some homebrew (Whitey's Gone Fishin' Pale Ale). And, of course, recording this for your entertainment. The clean-up will wait for another day.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-41844327492065987532008-08-09T11:21:00.001-04:002008-08-09T11:23:44.272-04:00The World Collectively Held Its Breath<p>
It's Olympics time, and this year in Beijing the world is collectively holding its breath.
</p>
<p>
This has nothing to do with the suspense of the games.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-73712445116870863472008-03-16T21:50:00.004-04:002008-03-16T22:05:51.871-04:00Maryland Driver's Licenses<p>
You'll find the following in the Maryland Code, under <a href="http://mlis.state.md.us/asp/web_statutes.asp?gtr&16-106">Transportation, §16-106</a>:
<blockquote>
<pre>
(a) Each application for a driver’s license shall be made
on the form that the Administration requires.
(b) The application shall state:
(1) The full name, Maryland residence address,
<b>employer</b>, race, sex, height, weight,
general physical condition, and date of birth
of the applicant; [emphasis added]
</pre>
</blockquote>
Evidently, the Maryland General Assembly believes that the MVA needs to know for whom you work
in order to determine whether you are a legal resident of Maryland capable of safely operating a
motor vehicle.
</p>
<p>
This repulsive change to the law, which was passed in April 2003 and took effect in October 2003,
was <a href="http://mlis.state.md.us/2003rs/billfile/hb0838.htm">House Bill 838</a>. The bill
page lists the sponsors, and has links to how Delegates and Senators voted.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-52675968187917789732008-02-26T18:40:00.002-05:002008-02-26T18:44:43.747-05:00Hilarity Ensues<p>
I give you, <a href="http://garfieldminusgarfield.tumblr.com/">Garfield minus Garfield</a>.
</p>
<p style="font-size:x-small">
From <a href="http://joshreads.com/">The Comics Curmudgeon</a>.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com1tag:blogger.com,1999:blog-10842063.post-64326914678312615412008-02-19T18:49:00.001-05:002008-02-19T18:49:55.884-05:00w00t!<p>That is all.</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com2tag:blogger.com,1999:blog-10842063.post-33725491231936577572008-01-28T21:24:00.000-05:002008-01-28T21:28:02.332-05:00The SMC is Back!<p>
The Self-Made Critic is back, reviewing <a href="http://www.thisisby.us/index.php/content/a_discussion_of_cloverfield">Cloverfield</a>. I was laughing through the whole review, which is in perfect SMC style. I was also laughing through the comments. Of the 13 that were posted when I read the review, <em>none</em> of them seemed to realize that it was in jest.
</p>
<p>
No word if The Editor is going to make a return appearance, as well.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com5tag:blogger.com,1999:blog-10842063.post-25978696387656501222008-01-01T13:12:00.000-05:002008-01-01T13:14:42.601-05:00On Pigeon Populations in European Cities<p>
In the mid-1400's, the waning Hundred Years' War and the brutal Wars
of the Roses left much of Europe, and England in particular, with
greatly reduced populations. With nations eager to boost their
numbers, various folklore traditions emerged regarding fertility. One
popular myth linking pigeon consumption and fecundity emerged in
London, from which it spread through most major European cities.
</p>
<p>
So great was the demand for pigeons that it drove quite a few
technological and culinary advancements. The two most enduring
developments from the 15th-century pigeon mania were the invention of
crampons and gravy.
</p>
<p>
While the wealthier individuals could maintain private coops, for most
people the typical pigeon on the plate was a wild bird. Pigeon
wranglers had to locate and reach the wild pigeon rookeries, which
necessitated new wall-climbing technologies. Eye-bolts were installed
in many walls, and notches, called "pigeon toe-holds" (the origin of a
common expression), were cut into many outside corners. The crampon
(invented in Prague in the year 1483) allowed pigeon hunters to
quickly attach to and release from installed eye bolts, without the
need to repeatedly tie and untie knots. Hunters with this technology
could collect many more birds than their competition, bringing in more
profit.
</p>
<p>
We owe the existence of gravy to the foul taste of pigeon, especially
the wild variety. Cooks would experiment widely with different ways
to mask the taste of wild pigeon, preferably with something with
superior flavor. Early gravies, being experimental, were largely
pastiches of whatever was at hand.
</p>
<p>
The word "pastiche," in fact, derives from these culinary experiments.
One early (and not particularly successful) gravy used orzo as a
thickening agent, and crushed cherries as the flavoring. The
resulting concoction was called "pasta and cherries," which was
shortened to the portmanteau "pastiche."
</p>
<p>
The end of widespread pigeon consumption is credited to King Henry
VIII of England. Concerned with his legacy, he consumed at least
three pigeons in gravy with every meal (breakfast, elevenses, lunch,
tea, and supper). In spite of this, he produced only three children,
largely discrediting the pigeon consumption-fecundity link. Further,
his death was the result of choking on a pigeon bone while enjoying a
midnight snack. This was widely publicized at the time, though the
official histories covered this up with a less embarrassing cause of
death, namely syphilis.
</p>
<p>
Because of the taste and proven lack of efficacy, pigeon consumption
dropped precipitously. With a century of cultivating the wild birds,
most cities possessed sufficiently large breeding populations that
pigeon eradication became impossible. One early attempt involved
introducing hawks to Paris, but this was quickly ended when the hawks
began preying on poodles. Since then, pigeons have become an endemic
part not only of European cities, but (due to long-distance shipping)
major cities throughout the world.
</p>Mike Marshhttp://www.blogger.com/profile/15730365232944097577noreply@blogger.com1