〰 Tidal, Archiloque's feed reader

Charles StrossEmpire Games

Empire Games

Empire Games, the first installment in my new Empire Games trilogy, launches on Tuesday 17th in the US market! (EU residents and Brits will have to wait until next Thursday—Tor UK and Tor USA, despite the name, are different companies and use different printers and sell through different supply chains.)

You can buy it in bookstores, but here are some handly links to ebook formats and mail-order outlets:

[Amazon.com Hardcover][Barnes & Noble hardcover][Powells City of Books Hardcover]]Amazon Kindle ebook][NOOK ebook][Kobo ebook]

(I'll provide UK links and updates on author events in a couple of days time.)

So what's it all about?

Back in 2009, when The Trade of Queens came out, I was so burned out with the Merchant Princes series that I basically set fire to the universe. Here's a useful tip when writing epic SF sagas; if you ever need to keep the readers on their toes, and thin out the cast of millions so you can get a handle on the survivors again, you can totally forget going stabby at a wedding reception a la "Game of Thrones"; what you really need is a brisk thermonuclear holocaust.

And lo, I was so done with that setting that it took three whole years, a "director's cut" re-release of the first six slim fantasy-branded books as three slightly slimmer (and heavily edited) big fat technothriller omnibus volumes, and a fit of insanity before I stopped saying "no" and grunted, "well, maybe ..." when my editor, David Hartwell, nudged me again.

You can read Empire Games as a stand-alone, a new thing in its own right, but if you read the previous series, it builds on top of it: you'll find it easier to work out what's going on, and possibly get more out of it, if you read the earlier books.

Empire Games reintroduces some of the characters from the first Merchant Princes series, but it's set 17 years later, in the 2020 of an unimaginably different sheath of parallel universes, and there are a bunch of new protagonists, too. (For quite some time, the working title was Merchant Princes: The Next Generation.) The horrible consequences of the ending of The Trade of Queens have played out at length, with echoes everywhere the world-walkers of the Clan have been.

In the United States, DHS has responsibility for securing the homeland from threats from every possible time line; domestic security is, shall we say, draconian. (And in the wake of the nuking of the White House, who's to say they're wrong?) Meanwhile, they're prospecting for oil (and handy carbon capture repositories) in uninhabited time lines, and have stumbled across a certain valley with an ancient dome in a neighboring time line.

The world of the New British Empire has undergone even greater upheavals, though. A new expansionist revolutionary entity, the New American Commonwealth, has emerged from the wreckage of the ancien regime, and is engaged in a desperate nuclear-armed cold war stand-off with the rival French empire. And one Miriam is prominent in the Commonwealth government, running a ministry for intertemporal technological industrial espionage. Because unlike the Clan, the Commonwealth government wants an industrial revolution—and Miriam's warning cry, "The Americans are coming", does not go unheeded.

When the first US mapping drones appear in the skies above the Commonwealth, everyone gets a nasty surprise: with two nuclear-armed paratime superpowers groping blindly for each other, a possible confrontation doesn't seem far off.

And then a young, struggling actor called Rita gets taken aside by the men in black and given a job offer she isn't allowed to refuse. Decades earlier Miriam had a baby, who was adopted: and the big national laboratories have finally worked out how to activate the world-walking trait in those who are carriers of the inactive trait. Her DHS controllers want Rita to spy on the Commonwealth, where they suspect her birth mother may be active. But they haven't looked hard enough at Rita's background, and by conscripting her they may have raised the long-dead ghost of a different cold war ...

(Book two, Dark State, is due out in January 2018, and will be followed by the final volume, Invisible Sun, in January 2019.)

(PS: of course, everything got re-titled! Originally, book 1 was going to be called Dark State, to be followed by Black Rain, then Invisible Sun. But marketing decided to mess around with the names for sales purposes ... and it's possible that book 3 may be renamed before publication. But what I can say is that book 2 is due for final edits at the beginning of February, and will be on its way to production not long after.)

Planet IntertwinglyEmpire Games
Empire Games, the first installment in my new Empire Games trilogy, launches on Tuesday 17th in the US market! (EU residents and Brits will have to wait until next Thursday—Tor UK and Tor USA, despite the name, are different companies and use different printers and sell through different supply chains.) You can buy it in bookstores, but here are some handly links to ebook formats and mail-order outlets: [Amazon.com Hardcover][Barnes & Noble hardcover][Powells City of Books Hardcover]]Amazon Kindle ebook][NOOK ebook][Kobo ebook] (I'll provide UK links and updates on author events in a couple of days time.) So what's it all about? Back in 2009, when The Trade of Queens came out, I was so burned out with the Merchant Princes series that I basically set fire to the universe. Here's a useful tip when writing epic SF sagas; if you ever need to keep the readers on their toes, and thin out the cast of millions so you can get a handle on the survivors again, you can totally forget going stabby at a wedding reception a la "Game of Thrones"; what you really need is a brisk thermonuclear holocaust. And lo, I was so done with that setting that it took three whole years, a "director's cut" re-release of the first six slim fantasy-branded books as three slightly slimmer (and heavily edited) big fat technothriller omnibus volumes, and a fit of insanity before I stopped saying "no" and grunted, "well, maybe ..." when my editor, David Hartwell, nudged me again. You can read Empire Games as a stand-alone, a new thing in its own right, but if you read the previous series, it builds on top of it: you'll find it easier to work out what's going on, and possibly get more out of it, if you read the earlier books. Empire Games reintroduces some of the characters from the first Merchant Princes series, but it's set 17 years later, in the 2020 of an unimaginably different sheath of parallel universes, and there are a bunch of new protagonists, too. (For quite some time, the working title was Merchant Princes: The Next Generation.) The horrible consequences of the ending of The Trade of Queens have played out at length, with echoes everywhere the world-walkers of the Clan have been. In the United States, DHS has responsibility for securing the homeland from threats from every possible time line; domestic security is, shall we say, draconian. (And in the wake of the nuking of the White House, who's to say they're wrong?) Meanwhile, they're prospecting for oil (and handy carbon capture repositories) in uninhabited time lines, and have stumbled across a certain valley with an ancient dome in a neighboring time line. The world of the New British Empire has undergone even greater upheavals, though. A new expansionist revolutionary entity, the New American Commonwealth, has emerged from the wreckage of the ancien regime, and is engaged in a desperate nuclear-armed cold war stand-off with the rival French empire. And one Miriam is prominent in the Commonwealth government, running a ministry for intertemporal technological industrial espionage. Because unlike the Clan, the Commonwealth government wants an industrial revolution—and Miriam's warning cry, "The Americans are coming", does not go unheeded. When the first US mapping drones appear in the skies above the Commonwealth, everyone gets a nasty surprise: with two nuclear-armed paratime superpowers groping blindly for each other, a possible confrontation doesn't seem far off. And then a young, struggling actor called Rita gets taken aside by the men in black and given a job offer she isn't allowed to refuse. Decades earlier Miriam had a baby, who was adopted: and the big national laboratories have finally worked out how to activate the world-walking trait in those who are carriers of the inactive trait. Her DHS controllers want Rita to spy on the Commonwealth, where they suspect her birth mother may be active. But they haven't looked hard enough at Rita's background, and by conscripting her they may have raised the long-dead ghost of a different cold war ... (Book two, Dark State, is due out in January 2018, and will be followed by the final volume, Invisible Sun, in January 2019.) (PS: of course, everything got re-titled! Originally, book 1 was going to be called Dark State, to be followed by Black Rain, then Invisible Sun. But marketing decided to mess around with the names for sales purposes ... and it's possible that book 3 may be renamed before publication. But what I can say is that book 2 is due for final edits at the beginning of February, and will be on its way to production not long after.)
QC RSSStraight To Business

Ads by Project Wonderful! Your ad could be here, right now.

Les CrisesMon nouveau livre (collectif) : L’Euro est il mort ?

Il est grand temps que je signale la parution fin 2016 d’un ouvrage collectif auquel j’ai contribué, sur l’euro – et que la tempête post-Trump a éclipsé.

J’ai réalisé la partie sur l’impact social de l’euro, à travers une série de graphiques originaux.

Jacques Sapir en a fait une recension sur son blog, que je reprends…

Source : Russeurope, Jacques Sapir, 19-10-2016

Le 20 octobre sort dans toutes les bonnes librairies de France (et de Navarre…) le livre L’Euro est-il mort, publié aux éditions du Rocher. Ce livre est une nouvelle contribution au débat, désormais bien engagé, sur l’Euro.

A quelques jours de la sortie du film, La Conquête, qui retrace l’ascension de Nicolas Sarkozy à la présidence de la République, André Bercoff publie aux éditions du Rocher « La Chasse au Sarko ».

Il s’agit d’un livre important, qui traite d’une question encore plus importante. C’est un livre collectif, et j’y ai contribué par deux chapitres, aux côtés de mes collègues dans cette aventure. Ces collègues appartiennent à diverses écoles de pensées. Alberto Bagnai est connu pour ses positions post-keynésiennes, dont je suis assez proche. De même d’autres auteurs représentent la gauche de combat dans cet ouvrage, de Maria Negreponti-Delivanis, qui nous parle de la tragédie grecque provoquée par l’Euro, à Olivier Berruyer ou Antoni Soy. D’autres auteurs ont des points de vue plus libéraux, comme Gérard Lafay, Jean-Jacques Rosa, Charles Gave ou Jean-Pierre Gérard. Certains d’entre nous sont des universitaires, ayant fait carrière et gravi les divers échelons qui conduisent au professorat. D’autres sont ce que l’on appelle, parfois avec une condescendance que rien ne peut justifier, des praticiens. Pourtant, bien souvent, ce sont ces mêmes praticiens qui ont une vue plus juste et plus pratique des problèmes posés. Et c’est justement le cas au sujet de l’Euro.

A quelques jours de la sortie du film, La Conquête, qui retrace l’ascension de Nicolas Sarkozy à la présidence de la République, André Bercoff publie aux éditions du Rocher « La Chasse au Sarko ».

C’est donc cette diversité des points de vue qui est extrêmement intéressante et stimulante. Nous arrivons aux mêmes conclusions par des chemins différents. C’est dire l’importance du principe de réalité, qui s’impose à tous quand on regarde les conséquences de la monnaie unique. Nous pouvons diverger sur les solutions à mettre en œuvre une fois que l’Euro sera détruit. Mais, nous nous retrouvons tous sur le constat atterré du désastre tant économique que politique qu’a provoqué l’Euro. Il faut ici remercier Jean-Pierre Gérard et l’institut POMONE, qui ont rassemblé ces points de vue divers mais convergents sur l’Euro, et cela depuis plusieurs années. Sans Jean-Pierre Gérard, il est probable que nous ne nous serions jamais retrouvé ensemble et que ce livre n’aurait jamais existé.

Mais, et je dois le dire avec une certaine force, je n’en suis nullement le « directeur » comme l’on dit d’un livre collectif dont un auteur prend en charge la collecte des articles et établit en réalité le programme scientifique du livre, en assignant donc différents chapitres aux différents auteurs. L’éditeur, confronté au problème délicat de « vendre » un livre écrit sous de nombreuses signatures, a cru bon m’en attribuer une large part de la paternité.

Ceci étant, le contenu de ce livre intéressera tous ceux qui sentent bien que la maison Euro craque, que l’Euro est une catastrophe, tant pour la France que pour les autres pays.

Source : Russeurope, Jacques Sapir, 19-10-2016

Hacker NewsThe Problem with AMP
Hacker NewsCharisma / Power
Ars TechnicaThe passing of Gene Cernan reminds us how far we haven’t come


I was sitting with Apollo 7 veteran Walt Cunningham in his west Houston living room on Monday afternoon when his wife, Dot, stepped tentatively in. "I'm sorry for interrupting," she said. "But Gene's dead."

She meant Eugene Cernan, the US Navy Captain who commanded Apollo 17, and the last person to walk on the Moon. He was 82 and had been ill for about six months.

Read 11 remaining paragraphs | Comments

Les Crises[Vidéo] Les 5 bombes économiques qui menacent la zone euro en 2017…

Incertitudes politiques, retour de l’inflation, hausse des taux, fragilité des banques, dossier grec : focus sur les 5 défis majeurs que la zone euro va devoir relever cette année…

(Lien direct)


Hacker News15'' MacBook Pro with Kaby Lake and 32GB of Desktop-Class RAM, Later This Year
Hacker NewsThis is how you hustle
Planet IntertwinglyHints and Tips on How to Manage Resources Using IBM DB2 Query Monitor Exception Perspective
  DB2 Query Monitor (DB2 QM) has various methods that DBAs can use to manage the resources consumed by SQL statements.   A popular approach is to manage resource usage via exception processing for specified thresholds.  DB2 QM’s EXCEPTION perspective provides a complete view of the performance metrics related to individual SQL statements which exceed user-specified thresholds. For example, a threshold may be set such that all SQL statements which have a DB2 elapsed time of greater than one second are captured. After DB2 QM displays a list of the exceptions, the displayed data can be sorted to show the longest-running SQL exceptions at the top.  This can be done by sorting by the DB2 elapsed time.  In the resulting sorted panel, the primary view will have metrics such as the associated connection name (CORRNAME), DB2 package or DBRM name (Program),  Delay Time, DB2 CPU Time, and Getpages (the number of times that DB2 requested a page from the buffer manager). The EXCEPTION perspective also provides line commands that provide access to more detailed information related to the execution of the SQL statement which help DBAs debug the cause of the exception.    Some very useful commands are: The “S” line command shows the SQL text for the selected record.   The “B” line command shows the SQL I/O statistics that drive buffer pool usage. DB2's data can be maintained in memory in what is referred to as the buffer pools. When DB2 can resolve a  GETPAGE request from the buffer pool it saves DB2 the cost of the more expensive page I/O.  High number of getpages requests means the SQL is accessing many pages to satisfy the request. This may or may not indicate inefficiency in the SQL. High number of page I/O (Synchronous Pages Read/Written) means there could be a bottleneck due to the buffer pool size, which needs to be increased.   For example: A SQL SELECT statement requests 99999 getpages .  This is very high.  The developer should analyze the SQL statement to determine if there is a way to rewrite the statement to reduce the getpages.   After rewriting we recheck the statistics and find that the new SQL still requests 9999 getpages ,  which means this cannot be reduced . However, the new SQL shows a buffer pool hit ratio of 50%, and Synchronous Pages Read as 5000.   This means that only half of the 9999 getpage requests are satisfied by page I/O. And DB2’s requests have to wait to bring pages into the buffer pool from disk I/O.  That will cause a long elapsed time. DBAs can increase the buffer pool size to increase the likelihood of the getpages being satisfied immediately from the buffer pool. The larger the buffer pool, the more pages are cached in memory.   The “C” line command shows the SQL performance metrics at the individual call level.  In the display below the overhead for the component parts of the SQL statement are shown. For example, individual lines would be displayed for the open, fetch, and close for an SQL statement which was using cursor type processing.                     In this second example below, we can see the STMT#  in the Call Level Statistics panel, that’s the statement number to help locate the SQL statement . DB2 QM panel:  The STMT# is 183.               To check the corresponding SQL statement, look at statement 183 in the program's precompiler output                             The host variables that are input to an SQL statement can be identified using the “H” line command. If the column titled “HV” contains the value of “YES”, this indicates that Query Monitor has collected host variables for that SQL statement. The variable’s type, length, and collected data are displayed. In addition, an indicator as to whether the variable can be a null value is displayed. The host variables are important because they can affect the size of the result set and/or the access path used by DB2. An example would be using the variable gender in a query.   When that query is run against the Girl Scouts database, would return very distinct result sets for male or female. Conversely, the same query  ran against the Boy Scouts database would return an inverse result.                             **                           Negative SQLCODE Exceptions If the exception is caused by a negative SQL code, the ESQLCode column will contain the negative SQL Code. The “C” line command can be used to view the SQLCA information. The SQLCA will contain the information about the failure returned by DB2.  For example, for a ‘-805’, we will see the package name and reason code.  Possible solutions are rebinding the plan and checking whether the DBRM or PACKAGE name are correct                   Combining columns to find exceptions It is possible that using multiple columns in the exception display can simplify problem analysis. For example, if you observe that the DB2 Elapsed time is very large, and the ESQLCODE is a ‘-913’, you might infer that a deadlock happened.   You can then use a “C” line command to analyze the SQLCA.  You should also check the “L” line command for any locking activity.               **             **
Hacker NewsOculus accused of destroying evidence, Zuckerberg to testify in VR theft trial
Hacker News80,000 Hours career plan worksheet
Planet IntertwinglyIBM Verse の拡張について
2017 年も基本的に毎月第 3 金曜日にテクてく Lotus 技術者夜会を開催させていただきます。 第 1 四半期に関しては、1月20日(金)、2月17日(金)、3月17日(金)の開催になります。 それ以降に関しては日程が決まり次第お知らせしますが、先述の通り基本的に第 3 金曜日になる予定です。 今年もみなさんの役に立ち、楽しい夜会にしたいと思いますので積極的にご参加ください。   今週の金曜日、1月20日(金)は 2017 年最初の開催となります。 今回は奇数月なのでザ・デベロッパー編として、IBM Verse の拡張について解説します。 IBM Verse についてもパートナー様のソリューションと連携するための UI 拡張ポイントや API を順次公開をしてく予定で、現状ではビジネスカードや リッチテキストエディタのアクションバーを拡張することが可能になっています。   その拡張を行うにあたりどのような環境で開発を行い、実際にどのように拡張をするのかについて デモを交えながら解説します。 また、将来向けてどのような拡張性が必要になるかについてもディスカッションしたいと思います。   未だに注目されている IBM Verse の可能性をさらに広げることができる技術になると思いますので、 是非ご参加ください。   申し込みや詳細は以下になります。 https://www.ibm.com/developerworks/jp/offers/events/techtech01/   また、IBM Verse の拡張についてのドキュメントも公開されています。 https://ibmcnxdev.github.io/verse-developer-chrome-ext/
Planet Intertwinglycoded, tested, selfdogfooded full #indieweb RSVP sending in @Falcon! https://indieweb.org/rsvp #microformats2 h-entry
coded, tested, selfdogfooded full #indieweb RSVP sending in @Falcon! https://indieweb.org/rsvp #microformats2 h-entry
Ars TechnicaCoinbase says fighting IRS subpoena could cost up to $1 million

Enlarge / Brian Armstrong, as seen here in 2014, is the CEO of Coinbase. (credit: TechCrunch)

Coinbase’s CEO, Brian Armstrong, has estimated that it will cost the company between $100,000 and $1 million to defend its customers from what he described as an “overly broad subpoena.”

Last month, a federal judge in San Francisco ruled that Coinbase could be ordered, at the request of the Internal Revenue Service, to provide years of data that would reveal the identities of all its active United States-based users.

The IRS is concerned that some of Coinbase’s customers may have used its service to circumvent or mitigate tax liability. Federal investigators say they need Coinbase’s records to be able to identify some Bitcoin wallets and to check against tax records to make sure Coinbase’s users are paying any and all proper taxes on their Bitcoin-related income.

Read 4 remaining paragraphs | Comments

Hacker NewsSolving a math problem to create art [pdf]
Planet Intertwinglymight go to 3rd Annual #FastAsSam Run 2017-01-28 https://www.facebook.com/events/1200929606668060/ depends how Sunrise 6k feels, Surf City taper
might go to 3rd Annual #FastAsSam Run 2017-01-28 https://www.facebook.com/events/1200929606668060/depends how Sunrise 6k feels, Surf City taper
Les CrisesL’Euro contre l’Europe, par Jacques Sapir

Source : Russeurope, Jacques Sapir, 04-11-2016

L’Union européenne traverse aujourd’hui crise majeure. Il s’agit d’une crise économique mais aussi d’une crise d’identité. A l’origine de cette crise on trouve l’Euro. La monnaie unique se voulait le couronnement de la construction européenne. En réalité, elle cause son déclin. Elle corrode les fondations économiques et sociales des pays qui l’ont adopté, met à mal la démocratie, suscite, peu à peu, la montée de comportements tyranniques qui produisent, en réaction une vague dite « populiste » sans précédent et sans égal. La monnaie unique cause des dysfonctionnements de plus en plus importants dans les pays qui l’ont choisie. Seule l’Allemagne semble y échapper ; ce n’est pas un hasard. L’Euro a été conçu par et pour l’Allemagne. Permettant une sous-évaluation de la monnaie allemande, l’Euro entraine aussi une surévaluation des monnaies de pays comme la France, l’Italie[1]et l’Espagne[2]. Cela se traduit par l’énorme excédent commercial structurel de l’Allemagne au détriment de ses voisins, un excédent commercial qui porte en lui la fin de l’Union européenne.

Sources : base de données du FMI (octobre 2016)

Sources : base de données du FMI (octobre 2016)

Sans l’Euro, cet excédent aurait produit une réévaluation de la valeur de la monnaie allemande, tout comme il aurait conduit à la dépréciation de la valeur des autres monnaies par rapport à la monnaie allemande. Or, ceci est impossible du fait de l’Euro. L’Allemagne avait ainsi une balance commerciale déficitaire de -1,4% du PIB en 1999 ; elle se retrouve avec un excédent de plus de 8% en 2015. Surtout, cet excédent ne cesse de s’accroître depuis l’introduction de l’Euro.

Les crises désormais sont permanentes depuis 2010. Elles ont de graves conséquences sociales, directes, comme on le voit avec la montée du chômage, et celui des jeunes dans les pays d’Europe du sud, ou indirectes, comme les politiques budgétaires stupidement restrictives adoptées pour « sauver l’Euro », qui entrainent une chute historique des investissements pesant non seulement sur la croissance mais sur le bien-être des populations. Les crises à répétition entre les pays de l’UE les dressent les uns contre les autres, et menacent la coopération européenne comme jamais auparavant. L’Euro constitue un défi et un danger pour l’état d’esprit européen. Le constat est désormais partagé par de nombreux économistes. Qu’il s’agisse de Lord Mervyn King, l’ancien gouverneur de la Bank of England ou Banque centrale du Royaume-Uni, qui vient de publier un livre[3] où il étrille l’Euro, de plusieurs prix Nobel, dont Joseph Stiglitz[4], ou d’un livre co-écrit par plusieurs économistes[5] – tous pensent de même. Ils ne sont pas les seuls. Des politiques de premier plan, comme Oskar Lafontaine (ex dirigeant du SPD et fondateur du parti Die Linke[6]), Stefano Fassina, ancien ministre du gouvernement de centre-gauche en Italie[7], ont joint leur voix aux critiques. Ces critiques sont le versant policé de la montée des mouvements populistes dans les différents pays européens, que ce soit le Mouvement 5 étoiles en Italie, PODEMOS en Espagne, le Front National en France, ou des mouvements similaires au Pays-Bas et même en Allemagne (avec AfD). Et cela nous mène à une question évidente: pourquoi donc l’Euro a-t-il été mis en place ?

1. L’histoire de l’Euro

Le projet est ancien. La réflexion sur une monnaie unique européenne date de la fin des années 1960 avec le rapport Werner[8]. Les obstacles étaient, eux aussi et déjà, bien connus. En 1977, le président de la Commission européenne de l’époque, le Britannique Roy Jenkins, proposa la création d’une monnaie unique pour les pays qui composaient alors la Communauté économique européenne. Mais il liait sa proposition à un budget communautaire dont le montant s’élèverait à 10 % du produit intérieur brut (PIB) des Etats membres. Cette idée était techniquementlogique, mais elle fut politiquement rejetée par la totalité des pays concernés. Elle l’est toujours aujourd’hui, alors que le budget de l’Union européenne ne dépasse pas les 1,25% du PIB. Or, sans budget fédéral, l’Euro ne peut fonctionner. Malgré cette faiblesse, on a institué l’Euro tout en sachant que le budget dédié à son fonctionnement était insuffisant. Cela appelle plusieurs explications.

Depuis la fin des années 1980, et en particulier avec le Traité de Maastricht entré en fonction en 1993 et qui a créé l’Union européenne s’est ainsi affirmé un projet politique : mettre en place des institutions fédérales ou encore supranationales. Or, ces institutions avaient été, et sont toujours, rejetées par les peuples européens à chaque fois que l’on a consenti à leur demander leur avis. Rappelons-nous le projet de Traité Constitutionnel, rejeté par référendum par la France et les Pays-Bas en 2005. Il fallait donc ruser. Les dirigeants européens ont donc consciemmentconstruits des institutions incomplètes, dont l’Euro est le meilleur exemple, en espérant que les crises naissant de cette incomplétude amèneraient les peuples à consentir, dans l’urgence, ce à quoi ils s’étaient refusés de manière raisonnée. Mais, cette ruse a failli. Les crises se sont multipliées, les unes après les autres. Pourtant, aucune n’a pu engendrer ce dépassement fédéral que les pères de l’Euro appelaient de leurs vœux. Le gouvernement français est bien seul, aujourd’hui, à porter le projet fédéral. Même le gouvernement allemand, qui fut longtemps son meilleur allié, se détourne désormais d’une logique politique qui ferait peser sur ses seules épaules le fardeau de la mise en place de ce fédéralisme. Ainsi se contente-t-elle de défendre un statu-quo qui l’avantage à l’évidence.

Nous sommes dans une impasse. Ne pouvant aller au-delà, et n’osant pas retourner en deçà, nous sommes condamnés à la crise. Au-delà, l’Euro détruit lentement les vieilles nations au sein desquelles s’était construite et consolidé la démocratie. Avec le traité sur la coopération et la gouvernance, dit aussi TSCG, que François Hollande fit ratifier en septembre 2012, c’est la maîtrise du budget, élément essentiel de notre souveraineté, qui est en passe d’être retiré aux élus de la Nation. Les politiciens organisent ainsi leur propre impuissance pour fuir leurs responsabilités. On réaffirme alors un dogme : « l’Euro protège ». Mais, de quoi, et comment, cela n’est jamais dit, et pour cause… « L’Euro favorise la croissance » est un autre point du crédo, que démentent pourtant les faits les plus évidents. L’Euro n’est pas – et ne peut pas être – un objet économique. Il n’est même pas un objet politique. Il est devenu un fantasme, celui qui dévoile en réalité ce grand désir de nombreux responsables et dirigeants politiques de se fondre dans une masse indifférenciée pour échapper à leurs responsabilités.

La « bonne nouvelle » des économistes et l’imposture

Il faut donc revenir sur les origines de l’Euro. Il nous fut présenté comme une terre de grandes promesses : mais elle s’est depuis, transformé en celle du grand mensonge. Tels les trois mages des évangiles, trois principales contributions, celles de Robert Mundell, de R. McKinnon et de Peter Kennen, sont venues porter la « bonne nouvelle ». Pourtant, des études récentes montrent le contraire.

La théorie des zones monétaires optimales (ou ZMO) a été énoncée par l’économiste Robert Mundell en 1961[9]. Elle entend fonder les raisons théoriques de l’existence de zones où il serait avantageux d’avoir une seule et même monnaie. Deux ans plus tard, c’est Allan Robert McKinnon qui apporta sa pierre à l’édifice[10]. Il explique que plus l’ouverture d’une économie sur l’extérieur est importante, plus l’importance du taux de change s’en trouve réduite. L’intérêt d’un ajustement par le taux de change devenait faible. Quant à Peter Kennen[11], il montrait que, si l’économie d’un pays était diversifiée, cette diversification réduisait l’ampleur de ce que les économistes appellent des « chocs exogènes », et permettait à ce pays d’être lié à d’autres par un taux de change fixe. De ces travaux, on pouvait donc déduire qu’un pays avait intérêt à se lier à d’autres par une monnaie unique sous réserve que le capital et le travail soient parfaitement flexibles, qu’il soit très ouvert sur le commerce international et que son économie soit largement diversifiée. Certains économistes avaient déduit des mouvements monétaires extrêmement importants qui s’étaient produits de 1975 à 1990 que la sensibilité des exportations (et des importations) au prix de ces produits était faible dans l’économie moderne. S’était alors développée l’idée que le commerce international se jouait essentiellement sur la qualité des produits. De même on a prétendu démontrer que des pays tireraient des avantages économiques importants d’une monnaie unique. Cette dernière était censée engendrer une augmentation très forte des flux commerciaux entre les pays de la zone monétaire ce que prétendait démontrer Andrew K. Rose[12]. Une littérature extrêmement favorable aux unions monétaires se développa, décrivant les monnaies nationales comme des « obstacles » au commerce international[13] et à l’augmentation de la production et des échanges potentiels[14]. L’union monétaire européenne allait créer les conditions de réussite de la « Zone Monétaire Optimal[15] », dans un mouvement qui semblait devoir être endogène[16].

Il y eut les déclarations imprudentes de divers hommes politiques affirmant que l’Euro allait conduire, de par sa seule existence, à une forte croissance. Jacques Delors et Romano Prodi ont affirmé que l’Euro allait favoriser la croissance européenne de 1% à 1,5% par an et ce pour plusieurs années[17]. Ils furent bien mauvais prophètes.

Le cauchemar de la réalité

Les recherches conduites sur des données plus complètes et plus rigoureuses, ont fortement réduit, voire annulés, les effets positifs de l’union monétaire[18]. La méthode économétrique utilisée était défectueuse[19]. Ces modèles ne prenaient pas en compte la persistance du commerce international[20]. Ceci devait aboutir à la remise en cause des résultats. Harry Kelejian a repris les diverses estimations des effets d’une union monétaire sur le commerce international des pays membres[21]. Les résultats sont dévastateurs. L’impact de l’Union économique et monétaire est estimé à une croissance du commerce de 4,7% à 6,3%, soit très loin des estimations les plus pessimistes des travaux antérieurs qui plaçaient ces effets à 20%, et ceci sans même évoquer les premières analyses de Rose qui les situaient entre 200% et 300%. En dix ans, on a réduit l’effet de 10 à 1 (de 200% à 20%[22]), puis une nouvelle réduction a ramené ces effets à une moyenne de 5% (un facteur de 4 à 1)[23]. Les effets positifs ont donc été largement surestimés, à l’évidence pour des raisons politiques.

On avait aussi avancé l’idée que l’Union monétaire et financière réduirait les risques des à-coups de la conjoncture économique[24], soit le risk-sharing devenu aujourd’hui l’un des arguments des défenseurs de l’Euro[25], régulièrement convoqué pour expliquer que l’Euro « protège ». Mais, le risk-sharing, quand il peut être mesuré, est bien plus le fait de mécanismes budgétaires que de l’unification d’un marché monétaire et financier[26]. Dans le cas de notre zone, il n’est pas évident que l’on ait un quelconque effet de cette sorte[27]. Sur ce point aussi, il est clair que les partisans de l’Euro ont menti. Or, si l’effet, sur le commerce international produit par une zone monétaire est faible, il faut en déduire qu’inversement l’effet des prix (ce que l’on appelle la « compétitivité coût ») est nettement plus important que ce qu’en dit le discours dominant[28]. Ceci redonne toute son importance aux dévaluations pour restaurer la compétitivité de certains pays.

La réévaluation des effets positifs des dépréciations monétaires

L’impact du taux de change sur les balances commerciales était connu. La rapidité du « rebond » de la Russie en 1999 et 2000 en particulier[29], a été l’un des principaux arguments allant dans ce sens. Les économistes du FMI ont réalisé une étude assez systématique sur une cinquantaine de pays[30]. Ils ne trouvent aucun signe de la fameuse « déconnexion » tant citée entre les flux du commerce international et les taux de change. L’étude montre qu’en moyenne, pour une dépréciation du taux de change de 10%, on obtient un gain de 1,5% du PIB. L’Euro fut donc vendu aux populations (et aux électeurs) sur la base de mensonges répétés, mensonges enrobés dans un discours se donnant pour scientifique, mais qui ne l’était nullement. Il y a donc eu manipulation, non pas tant des économistes que des politiques qui se sont servis de leurs travaux. Il s’est construit ce qu’il faut bien appeler un mensonge. L’Euro ne pouvait avoir de bases démocratiques.

2. L’Euro et l’Europe

Les méfaits de l’Euro se sont donc faits sentir dans l’Union européenne. Pourtant, cette dernière est loin d’être convertie dans sa totalité à l’Euro. Plusieurs pays, et non des moindres, tels la Grande-Bretagne, la Hongrie, la Pologne ou la Suède, ont refusé – et refusent toujours – de rejoindre la zone Euro. Force est de constater qu’ils ne s’en portent pas plus mal, loin de là. L’Euro mine l’Union. La crise de l’Euro a paralysée l’UE depuis 2010, et l’a entraînée dans toujours plus d’austérité, suscitant alors une vigoureuse remise en cause de la part des électeurs. Les succès électoraux des partis eurosceptiques, que l’on qualifie de « populistes », en témoignent.

L’Euro et la faible croissance de l’économie européenne

On peut comparer les taux de croissance annuel entre une sélection des 9 pays les plus importants de la zone et le reste des pays développés. L’écart du taux de croissance moyen est, par an, d’environ 1% entre les pays de la zone Euro et les autres pays. Pourtant, ces pays ont connue eux aussi leur lot de problèmes, qu’il s’agisse des États-Unis ou du Royaume-Uni.

L’écart est encore plus spectaculaire si on le compare aux résultats de la Suède, pays européen qui a justement refusé d’adhérer à l‘Euro, ou au Canada. On mesure ainsi les effets délétères de l’Euro sur la croissance. La crise de la zone Euro a aggravé ce freinage. L’Euro a freiné la sortie de crise, voire a aggravé cette dernière dans de nombreux pays. La crise de 2007-2010 a été plus facilement surmontée dans les pays qui n’avaient pas l’Euro que dans ceux qui l’avaient. L’Euro n’a donc nullement « protégé » les pays de la zone. Si l’on prend en compte le PIB par habitant, meilleur indicateur de la richesse réelle d’une population, un seul pays a vu son PIB par habitant s’accroître de manière conséquente par rapport à 1999, c’est l’Allemagne. C’est d’ailleurs le seul pays de la zone où le PIB par habitant se soit accru après la crise financière, de 2008 à 2015. De fait, l’Allemagne est le seul pays de la zone à avoir des chiffres de croissance comparables à ceux des pays ne faisant pas partie de l’Euro, comme le Canada, le Royaume-Uni, la Suède, ou les États-Unis.


Source : base de donnée du FMI

Source : base de donnée du FMI

La chute est importante pour les autres comme dans le cas de la Grèce (-3,2% par an depuis 2008). Elle est significative pour la Finlande, l’Espagne, l’Italie et le Portugal. Si l’on retirait l’Allemagne de l’échantillon on verrait que le bilan de la zone Euro est encore plus négatif.

La chute des investissements, elle aussi spectaculaire, compromet le développement de l’économie pour les prochaines années et annonce l’équivalent d’une décennie perdue pour les pays de la zone Euro. L’investissement s’est contracté dans la plupart des pays considérés. La chute, faible en ce qui concerne l’investissement global, est significative pour l’investissement par habitant. Cela se traduit par le non-renouvellement du stock de capital par personne. Le contraste est alors saisissant avec les pays ne faisant pas partie de la zone Euro.


Les seuls pays qui échappent à cette tendance sont la Belgique, la Finlande et la France. Cette contraction est importante en Italie et en Espagne, et catastrophique au Portugal et en Grèce. Ces derniers pays ont le même niveau d’investissement que celui qui était le leur au milieu des années 1980. La partie du continent européen qui vit sous le joug de l’Euro a donc vu le capital fixe par habitant stagner depuis 1999. Or, ce dernier est constitué de choses concrètes, comme des logements, des infrastructures, des routes, des ponts, des voies de chemin de fer ou des aéroports, des systèmes d’adduction d’eau, des systèmes de communication, mais aussi un capital plus directement productif, composé de machines, de bâtiment pour loger ces machines, et ainsi de suite.

C’est bien pourquoi la stagnation de cet investissement par habitant, voire sa diminution, présente une telle menace pour le niveau de vie futur des populations européennes. A contrario, les pays qui ne sont pas dans l’Euro, la Suède, le Royaume-Uni, pour n’évoquer que les pays européens, le Canada et les États-Unis pour l’Amérique du Nord, ont continué à accroître le capital par habitant.

Source : Base de données du FMI

Source : Base de données du FMI

L’Euro et la perte de confiance de l’Europe

On ne peut donc faire fonctionner la monnaie unique sans provoquer une catastrophe en Europe, et au-delà dans l’économie mondiale. L’impact des politiques d’austérité qui n’ont été mises en œuvre que pour « sauver » l’Euro dépasse ainsi de loin les frontières de l’Europe[31]. Cet impact est catastrophique dans le domaine du chômage. Il se concentre sur l’Europe du Sud, où il frappe den priorité les jeunes et fait sentir ses effets dans la démotivation, voire le désespoir, des nouvelles générations, en Grèce, en Espagne et en Italie. C’est alors un capital immatériel que l’Euro détruit, dans ses effets sur la confiance en soi de millions de jeunes et dans les ravages sociaux que cette perte de confiance engendre.

On comprend alors la frilosité des populations européennes face aux réfugiés du Moyen-Orient. Il faut être aveugle pour ne pas voir que ce qui s’exprime dans cette frilosité c’est l’angoisse du lendemain pour des millions et des millions de gens, la destruction de la confiance, la perte de l’idée de l’avenir. De 1945 à 1950, les pays européens eurent à gérer un problème de réfugiés bien plus important que celui d’aujourd’hui. Mais, on avait confiance en l’avenir. Dans les difficultés, pourtant immenses, de la reconstruction de l’après-guerre, les populations sentaient confusément que la situation s’améliorait mois après mois. C’est pourquoi on a su trouver de la place à ces réfugiés. On mesure alors ce que l’Euro coûte aux populations européennes, que ce soit directement – pour les pays membres de la zone Euro – ou que ce soit indirectement pour les autres pays. Parce que l’Euro a été mis en place dans le cœur historique de l’Europe, sa crise affecte naturellement l’Europe toute entière.

L’impossibilité du fédéralisme

La crise grecque, un pays qui représente moins de 3% du PIB de la Zone Euro, est ainsi devenue majeure. Les fondements mêmes de l’UE ont été durablement ébranlés et déconsidérés. La crise des banques italiennes, venant après celle des banques espagnoles et avant celle des banques allemandes, est une nouvelle cause constante d’inquiétude pour les marchés financiers. Ici encore, les institutions de règlement de ces crises, ce que l’on appelle l’union bancaire, qui avaient été mises en place en 2012, n’ont pas fonctionné. Ces crises devront être réglées dans un cadre national. Bien entendu, les moyens existent. Mais, à chaque fois, c’est la zone Euro qui se défait un peu plus.

Car la cause réelle de ces diverses crises n’est pas l’endettement de la Grèce, les mauvaises dettes accumulées dans les banques italiennes, ou les opérations douteuses réalisées sur les marchés financiers par les banques allemandes : c’est le fonctionnement de la zone Euro. Il dresse les peuples les uns contre les autres et ranime les pires des souvenirs de l’histoire européenne. Si l’UE et l’Europe sont deux choses différentes, aujourd’hui, ce qui se joue à Bruxelles n’est plus seulement l’avenir de la Grèce ou de l’Euro, c’est l’existence même de l’Union européenne et l’avenir de l’Europe.

Si, dans des pays fédéraux comme l’Inde, l’Allemagne ou les États-Unis une même monnaie fonctionne en dépit des divergences, parfois extrêmes, qui existent entre les territoires composant ces pays c’est avant tout parce qu’existent des flux de transfert importants. Ceci n’a pu être mis en place au sein de la zone Euro, en raison de l’opposition de nombreux pays mais, par dessus tout, en raison de l’opposition totale de l’Allemagne. Beaucoup de ceux qui écrivent en faveur de l’Euro se lamentent alors sur ce qu’ils appellent « l’égoïsme allemand[32] ». Ils ne prennent jamais la peine de mesurer ce que coûterait à l’Allemagne le financement de ces flux de transfert. Le calcul a été présenté[33]. Il s’évaluait alors autour de 260 milliards d’euros par an, sur une période de dix ans, et ce uniquement pour aider les 4 pays du « Sud » que sont l’Espagne, l’Italie, le Portugal et la Grèce. Sur cette somme, on peut penser qu’environ 90% serait fourni par l’Allemagne. On aboutit alors à un prélèvement sur la richesse produite en Allemagne compris entre 8% et 9% du PIB. Une autre source estimait même ce prélèvement à 12%[34]. Or, imposer un tel prélèvement à l’Allemagne détruirait son économie. La question n’est donc pas que l’Allemagne ne veuille pas mais qu’elle ne peut pas supporter de tels prélèvements.

Le glissement vers la tyrannie

Confrontés à l’impossibilité de mettre en place une union de transfert, les gouvernements de la zone Euro ont cru trouver leur salut dans une combinaison de cures d’austérité dont les effets récessifs ont fragilisé les économies, et d’une politique monétaire expansionniste menée par la Banque centrale européenne. Mais, cette politique monétaire n’a pas résolu le problème et elle est aujourd’hui au bout de ses possibilités. Cela revient à soigner une pneumonie avec de l’aspirine, médicament qui certes permet à la fièvre de baisser, mais ne soigne pas.

L’Allemagne est aujourd’hui, et plus que jamais, opposée à une union de transferts. Elle a réussi à imposer sa propre logique de gestion grâce aux divers « pactes » de solidarité qui ont été signés depuis 2011[35]. C’est ce que l’on appelle le « six pack », qui a été consolidé dans le TSCG signé en 2012[36], et qui est entré en vigueur le 1er janvier 2013. Ces traités ne font que renforcer les mécanismes d’austérité qui enserrent les économies européennes. Mais, surtout, ils tendent à imposer un cadre disciplinaire au-dessus de la souveraineté des peuples. C’est dans ses comportements que se joue le tournant progressif de l’Union européenne vers une tyrannie[37]. L’Euro a entraîné les économies des pays membres de la zone dans une logique de divergence de plus en plus forte qui conduit à des plans d’austérité de plus en plus violent. Ces plans exaspèrent les populations et dressent celles des pays ayant moins de problèmes contre celles des pays qui en souffrent le plus. Loin d’être un facteur d’unité et de solidarité, l’Euro entraîne le déchaînement des égoïsmes des uns et des autres et la montée des tensions politiques.

3. Sortir de l’Euro

Les dangers de l’Euro sont donc évidents et reconnus tant par des hommes politiques que par des dizaines d’économistes français et étrangers. La liste ne fait d’ailleurs que s’allonger[38], et compterait désormais plus de 175 noms. L’objectif de mettre fin à la monnaie unique, que ce soit dans la cadre d’une dissolution concertée ou que ce soit par une sortie unilatérale, devient désormais prioritaire si l’on veut sauver l’Union européenne. De la même manière que la sortie de la crise des années 1929-1932 impliqua la fin du Bloc-or, la sortie de la crise qui dure maintenant depuis près de dix ans en Europe, implique que l’on mette fin à l’Euro. Le débat sur une sortie, ou sur dissolution, suscite pourtant un certain nombre de questions récurrentes.

Mettre fin à la monnaie unique : un impératif

Une dépréciation de l’Euro pourrait-elle remplacer la dissolution de la zone Euro ? Cette thèse a été avancée de 2010 à 2014 quand le taux de change de l’Euro face aux autres monnaies était très élevé. En réalité, les tenants de cette thèse ont tendance à oublier :

  1. Dans un processus de dépréciation de l’Euro, la parité implicite de chaque pays de la zone entre eux n’est pas modifiée. Or, le problème réside dans les différences de situation à l’intérieur de la zone[39]. Un Euro déprécié avantage l’Allemagne bien d’avantage que les autres pays, si les taux des changes intérieurs à la zone restent constants, à leur niveau fixé en 1999. C’est le rapport entre les monnaies au sein de la zone qu’il faudrait pouvoir modifier pour tenir compte des différences entre les gains de productivité et les taux d’inflation entre chaque pays. Mais, cela, techniquement, exige en réalité que l’on mette fin à l’Euro.
  2. Le fait que tous les pays n’ont pas le même degré d’intégration dans la zone Euro. La France est aujourd’hui l’un des moins intégrés, alors que le taux d’intégration de l’Espagne ou de l’Italie est nettement plus élevé. Dans une dépréciation de l’Euro, la France gagnerait ainsi nettement plus que ses deux voisins du Sud. Soutenir l’idée de la dépréciation de l’Euro par rapport au Dollar, c’est en un sens vouloir la mort des pays du Sud de la zone.

La zone Euro fonctionne comme un système de parités rigides, équivalent du Bloc-or du début des années 1930, et ce sans la possibilité de dévaluer cette parité. Les économistes connaissent bien les inconvénients d’un tel système. Il empêche les ajustements naturels qu’il faut réaliser car les pays ont des trajectoires de gains de productivité et d’inflation qui sont très différentes. Ce système rigide fut l’une des causes de la grande dépression qui suivit la crise de 1929, et ce jusqu’à ce que les pays, les uns après les autres, se mettent à déprécier leurs monnaies, sortant du Bloc-or. L’Allemagne et le Royaume-Uni, en particulier, avaient initialement tenté de mettre en place des politiques de « dévaluations internes » pour maintenir la parité-or de leurs monnaies. Mais la « dévaluation interne » n’est autre que ce que l’on appelait, dans les années 1930, une politique de déflation[40], comme celle qui fut pratiquée par Ramsay Macdonald en Grande-Bretagne, Pierre Laval en France ou le chancelier Heinrich Brünning en Allemagne[41]. Les résultats en furent dramatiques. Compte tenu de la présence de rigidités nominales différentes suivant les prix[42], et du fait que les coûts financiers sont constants en valeur nominale, ces politiques se sont toutestraduites par des désastres sociaux Et économiques. Cette politique est aujourd’hui largement responsable de la hausse du taux de chômage dans les différentes économies du «Sud de la zone Euro. De fait, il n’y a pas d’alternative à ces politiques d’austérité tant que l’on restera dans la zone Euro.

Une sortie de la zone Euro entraînera-t-elle une catastrophe ?

A entendre ceux qui condamnent toute sortie de l’Euro, nous serions menacés d’une terrible catastrophe économique. Ce discours cherche à provoquer une réaction de peur et non une réflexion raisonnée, et raisonnable, sur ce sujet. Que des personnes en soient réduites à ce type d’argument dit bien à quel point on est entré dans le domaine du religieux dès que l’on évoque une sortie de l’Euro. L’un des arguments est qu’une disparition de la monnaie unique entraînant une dépréciation de la monnaie provoquerait une explosion de l’endettement de la France avec des conséquences désastreuses. L’ancien président de la République, Nicolas Sarkozy, s’est illustré en France dans la défense de cet argument qui est l’un des plus mensongers.

Il faut rappeler ici l’état du problème. En droit international ce qui compte n’est pas la nationalité du prêteur mais la nationalité des contrats. Quand une dette, publique ou privée, a été émise en droit français, sa monnaie de règlement est la monnaie ayant cours légal en France, quel que soit cette monnaie (Euro ou Franc, ou Lire, ou Pesetas). Ce principe porte un nom, la Lex Monetae[43]. Pour le cas de la France, la dette publique, les contrats émis en droit français représentent 97% de la dette en 2013. La dette des ménages, elle, est à plus de 98,5% en contrats en droit français. L’endettement des ménages resterait donc inchangé. Pour les entreprises non financières, le problème de la nature du droit ne se pose que pour celles, en général les grands groupes du CAC-40, qui ont emprunté en Dollar, en Livre ou en Yen (voire en Yuan). Mais, ces grands groupes réalisent aussi une large partie de leur chiffre d’affaires hors de France, et dans ces monnaies. La hausse de leur endettement serait couverte par la hausse de leur chiffre d’affaires en monnaie autre que le Franc. Pour les sociétés financières (banques et assurances), une étude de la Banque des règlements internationaux (BRI) de Bâle montre que le système bancaire français peut parfaitement digérer ce choc, dont le montant agrégé ne dépasserait pas les 5 milliards d’Euros. Quant aux assurances, elles ont massivement réorienté leurs actifs vers la France. Si une aide de l’État est nécessaire, elle devrait être limitée.

Une sortie de l’Euro impliquerait un changement global de la politique monétaire et financière de TOUS les états concernés. L’une des caractéristiques les plus importantes de ce changement serait le retour à une situation de réglementations de la finance, ce que l’on appelle la « répression monétaire ». Or, cette dernière eut un impact très positif, que ce soit sur la production ou sur l’investissement, quand elle fut pratiquée après la seconde guerre mondiale[44].

Les avantages d’une dissolution de l’Euro

Les avantages d’une dissolution de l’Euro seraient très importants pour la France comme pour l’Italie, l’Espagne, la Grèce et le Portugal. Cette dissolution, ou une sortie unilatérale provoquant rapidement l’explosion définitive de la zone, rendrait aux différentes monnaies la possibilité de s’ajuster, que ce soit à la baisse ou à la hausse. On sait qu’une dépréciation a des effets positifs sur l’économie, comme le montrent les études réalisées ces dernières années, et en particulier celles Fonds Monétaire International. En particulier, la compétitivité prix reste largement dominante dans le cas des produits fabriqués en France. La France retrouverait donc la compétitivité qu’il a perdue depuis l’engagement dans la logique de l’Euro, c’est à dire depuis en réalité le début des années 1990.

Une dépréciation des monnaies dans les pays en difficultés, combinée avec une réévaluation du Deutsche Mark, entraînerait une forte croissance pendant une période de 3 à 5 ans qui se traduirait par des créations d’emplois importantes. Cette croissance dégagerait les ressources budgétaires et fiscales qui sont nécessaires à la réalisation de véritables réformes structurelles. La forte baisse du chômage entraînerait un équilibre (voire un solde positif) de l’assurance-chômage. En fait, la meilleure des réformes structurelles, que ce soit sur la question de l’assurance-chômage ou sur celle des retraites, c’est bien le retour rapide à une forte croissance et une forte baisse du chômage. Loin de s’opposer, la dépréciation monétaire est le meilleur moyen de réaliser ces réformes structurelles. Les dépréciations monétaires ne s’annuleraient pas les unes par rapport aux autres. Il est certain que le du Deutsche Mark s’apprécierait fortement, par rapport à la Lire italienne à la Pesetas espagnole et au Franc français. Cette situation se révèle favorable tant pour la France que pours les divers pays du « Sud » de la zone Euro. L’excédent commercial « monstrueux » de l’Allemagne, qui détruit les économies européennes, disparaitrait du fait de l’écart entre les taux de change du Franc, de la Lire et de la Pesetas avec le Deutsche Mark. Cet excédent serait pour partie recyclé dans un excédent français et pour partie au profit de l’Italie, de l’Espagne et de la Grèce et du Portugal.. Ceci a été testé[45], et l’on peut montrer que des dépréciations monétaires engendrent une forte croissance non seulement pour la France, mais aussi pour l’ensemble de l’Europe du sud.

La fin de l’Euro est-elle la fin de l’Union européenne ?

Certains, après avoir reconnu et admis que l’Euro était une mauvaise chose pour la France mais aussi pour l’UE, prétendent qu’en sortir entraînerait automatiquement la fin de l’Union européenne. Pourtant, y a des pays, et des pays importants, qui font partie de l’UE et pas de la zone Euro : la Grande-Bretagne (bien que sa sortie soit proche), la Pologne, la Suède. Par ailleurs, l’UE a existé bien avant que ne soit créé l’Euro. Il est donc faux de dire qu’un éclatement de la zone monétaire conduirait à un éclatement automatique de l’UE. C’est l’existence de l’Euro qui compromet aujourd’hui l’UE et qui la rend, dans tous les pays, massivement impopulaire. C’est au nom de l’Euro que l’on a imposé des politiques d’austérités qui sont meurtrières (que l’on pense à la montée des suicides et des pathologies associées) aux pays de l’Europe du sud. C’est l’Euro qui, par ses effets négatifs sur la croissance, fait que, aujourd’hui, l’UE est une zone de stagnation économique tant par rapport à l’Amérique du Nord (Etats-Unis et Canada) que par rapport à la zone Asie-Pacifique. C’est l’Euro, du fait de la crise qu’il provoque à l’intérieur de certains pays, qui menace la stabilité politique et l’intégrité de ces derniers. C’est pourquoi les économistes du European Solidarity Manifesto[46] appellent à mettre fin à l’Euro avant que ce dernier n’ait tué l’Europe.

Il ne faut cependant pas se voiler la face. L’Euro a contaminé l’Union européenne. Il sera inévitable qu’à la suite de la dissolution de l’Euro on remette à plat un certain nombre de problèmes, et d’institution. Mais, l’UE n’est pas l’Europe. L’UE peut disparaître, le besoin d’une coopération entre pays européens se maintiendra.



[1] Bagnai A., « Italy’s decline and the balance-of-payments constrainte : a multicountry analysis » in International Review of Applied Economics, n°20, 2016, pp. 1-26.

[2] IMF, 2016 External Sector Report, 18 juillet 2016, Washington, International Monetary Fund, Washington, D.C.

[3] King, Mervyn A., The End Of Alchemy: Money, Banking And The Future Of The Global Economy, Londres, Little, Brown (à paraître)

[4] Stiglitz Joseph E., The Euro: And its Threat to the Future of Europe, New Yok, Allen Lane, 31 mai 2016, (à paraître)

[5] Coll. L’Euro est-il mort ?, Paris, Editions du Rocher, 2016.

[6] La déclaration se trouve dans le journal Neues Deutschlandhttp://www.neues-deutschland.de/artikel/820333.wirbrauchen-wieder-ein-europaeisches-waehrungssystem.html ainsi que sur le blog d’Oskar Lafontaine : http://www.oskar-lafontaine.de/linkswirkt/details/f/1/t/wir-brauchen-wieder-ein-europaeischeswaehrungssystem/

[7] Fassina S., « For an alliance of national liberation fronts », article publié sur le blog de Yanis Varoufakis par Stefano Fassina, membre du

Parlement (PD), le 27 juillet 2015, http://yanisvaroufakis.eu/2015/07/27/foran-alliance-of-national-liberation-fronts-by-stefano-fassina-mp/

[8] Aris M. et N. M. Healey, « The European Monetary System », in N. M. Healey, The Economics of the New Europe, Londres-New York, Routledge, 1995, p. 45-67

[9] Mundell R., « A theory of optimum currency areas », in The American Economic Review, vol. 51, n°5,‎ 1961, pp. 657-665.

[10] McKinnon R.I., « Optimum Currency Area » in The American Economic Review, Vol. 53, No. 4, 1963, pp. 717-725

[11] Kenen, P.B., “The Theory of Optimum Currency Areas: An Eclectic View, ” in Mundell R.A. et A.K. Swoboda (edits) Monetary Problems of the International Economy, Chicago, Ill., Chicago University Press, 1969.

[12] Rose, A.K., « One money, one market: the effect of common currencies on trade », Economic Policy Vol. 302000, pp.7-45 et Rose, Andrew K., “Currency unions and trade: the effect is large,” Economic Policy, Vol. 33, 2001, 449-461.

[13] Rose, A.K., Wincoop, E. van, « National money as a barrier to international trade: the real case for currency union », American Economic Review, Vol. 91, n°2/2001, pp. 386-390.

[14] De Grauwe, P., Economics of Monetary Union, New York: Oxford University Press, 2003. Frankel, J.A., Rose A.K., « An estimate of the effect of currency unions on trade and output », Quarterly Journal of Economics, Vol. 108, 2002, n°441, pp. 1009-25.

[15] Laurentjoye T., La théorie des zones monétaires optimales à l’épreuve de la crise de la zone euro, Formation « Économie des Institutions », EHESS, Paris, septembre 2013.

[16] Frankel, J.A., Rose A.K., « The endogeneity of the optimum currency area criteria », Economic Journal, Vol.108, 449, 1998, pp.1009-1025. De Grauwe, P. Mongelli, F.P., «Endogeneities of optimum currency areas. What brings countries sharing a single currency closer together? », Working Paper Series, 468, European Central Bank, Francfort, 2005.

[17] Sapir J., Faut-il sortir de l’Euro ?, Le Seuil, Paris, 2012.

[18] Bun, M., Klaasen, F., « The euro effect on trade is not as large as commonly thought», Oxford bulletin of economics and statistics, Vol. 69, 2007, pp. 473-496. Berger, H., Nitsch, V., « Zooming out: the trade effect of the euro in historical perspective », Journal of International money and nance, Vol. 27 (8), 2008, pp. 1244-1260.

[19] Persson T., « Currency Unions and Trade : How Large is the Treatment Effect ? » in Economic Policy, n°33, 2001, pp. 435-448 ; Nitsch V., « Honey, I Shrunk the Currency Union Effect on Trade », World Economy, Vol. 25, n° 4, 2002, pp. 457-474.

[20] Greenaway, D., Kneller, R., « Firm hetrogeneity, exporting and foreign direct investment », Economic Journal, 117, 2007, pp.134-161.

[21] Kelejian, H. & al., « In the neighbourhood : the trade effects of the euro in a spatial framework », Bank of Greece Working Papers, 136, 2011

[22] Du travail initial de A.K. Rose datant de 2000 mais réalisé en fait entre 1997 et 1999 « One money, one market: the effect of common currencies on trade », Economic Policy 30,op.cit., au travail de R. Glick et A.K. Rose, datant de 2002, « Does a Currency Union Affects Trade ? The Time Series Evidence », op. cit..

[23] Bun, M., Klaasen, F., « The euro effect on trade is not as large as commonly thought», Oxford bulletin of economics and statistics, op.cit., estiment l’effet « positif » de l’UEM à 3%, ce qui le met largement dans l’intervalle d’erreurs de ce genre d’estimations.

[24] Artis M. et M. Hoffman, « Declining Home Bias and the Increase in the International Risk Sharing: Lessons from European Integration » , CEPR discussion Papers, 6617, 2007 ; Afonso A. et D. Furceri, « EMU enlargement, stabilization costs and insurance mechanisms », in Journal of International Money and Finance , vol. 27, 2008, pp. 169-187 ;

[25] European Commission, (2007), «Focus: cross-border risk sharing: has it increased in the euro area? », Quaterly report on the euro area, n°3, Bruxelles.

[26] Clévenot M et V. Duwicquet (2011), « Partage du risque interrégional. Une étude des canaux budgétaires et financiers aux États-Unis et en Europe », in Revue de l’OFCE 2011/4 (n° 119), p. 5-33.

[27] Duwicquet V. et J. Mazier, (2011), «Financial integration and macroeconomic adjustment in a Monetary Union », in Journal of Post Keynesian Economics, hiver 2011.

[28] C’est le sens d’une note rédigée par P. Artus, « C’est la compétitivité-coût qui devient la variable essentielle », Flash-Économie, Natixis, n°596, 30 août 2013.

[29] Sapir J., « The Russian Economy: From Rebound to Rebuilding », in Post-Soviet Affairs, vol. 17, n°1, (janvier-mars 2001), pp. 1-22.

[30] Leigh, D, W Lian, M Poplawski-Ribeiro et V Tsyrennikov (2015), “Exchange rates and trade flows: disconnected?”, Chapitre 3 in World Economic Outlook, IMF, Octobre 2015.

[31] Bibow J. et A. Terzi, edits. Euroland and the World Economy, Palgrave MacMillan, New York, 2007.

[32] Voir Michel Aglietta, Zone Euro : éclatement ou fédération, Michalon, Paris, 2012.

[33] Voir Sapir J., « Le coût du fédéralisme dans la zone Euro », note publiée sur le carnet RussEurope, 10 novembre 2012, http://russeurope.hypotheses.org/453

[34] Patrick Artus, « La solidarité avec les autres pays de la zone euro est-elle incompatible avec la stratégie fondamentale de l’Allemagne : rester compétitive au niveau mondial ? La réponse est oui », NATIXIS, Flash-Économie, n°508, 17 juillet 2012.

[35] Déclaration des chefs d’État et de gouvernement de la zone euro du 25 mars 2010 (http://www.consilium.europa.eu/uedocs/cms_data/docs/pressdata/fr/ec/113564.pdf ); Traité instituant le mécanisme européen de stabilité, 11 juillet 2011, http://www.eurozone.europa.eu/media/582863/06-tesm2.fr12.pdf

[36] Voir « Traité sur la stabilité, la coordination et la gouvernance au sein de l’Union économique et monétaire », http://www.senat.fr/cra/s20121011/s20121011_mono.html

[37] Sapir J., « La zone Euro : du cadre disciplinaire à la ‘démocrannie’ », in Coll., L’Euro est il mort ?, op.cit., pp. 111-124.

[38] On peut consulter l’état de 2014 de cette liste à l’adresse suivante : https://blogs.mediapart.fr/brigitte-pascall/blog/210414/liste-des-economistes-favorables-une-sortie-de-leuro

[39] IMF, 2016 External Sector Report, 18 juillet 2016, op.cit..

[40] Goodhart C. et B. Hofmann (2004), « Deflation, credit and asset prices », In Burdekin R. C. K. & P. L. Siklos, (eds.), Deflation – Current and Historical Perspectives, Cambridge University Press, Cambridge, 2004.

[41] Eschenburg, T. (1972), « The Role of the Personality in the Crisis of the Weimar Republic: Hindenburg, Brüning, Groener, Schleicher », in Holborn H., Republic to Reich The Making of the Nazi Revolution, New York: Pantheon Books, pp. 3–50.

[42] Greenwald B.C. et J.E. Stiglitz, (1989), “Toward a Theory of Rigidities” in American Economic Review, vol. 79, n°2, 1989, Papers and Proceedings, pp. 364-369. J.E. Stiglitz, (1989), “Toward a general Theory of Wage and Price Rigidities and Economic Fluctuations” in American Economic Review, vol. 79, 1989, Papers and Proceedings, pp. 75-80

[43] Garner, B. A. (2001). A Dictionary of Modern Legal Usage, Oxford University Press, p. 526.

[44] Reinhart C. et K. Rogoff, Financial and Sovereign Debt Crises: Some Lessons Learned and Those Forgotten, IMF/FMI Working paper, Washington DC, 2013.

[45] Sapir J., Les scénarii de dissolution de l’Euro, (avec P. Murer et C. Durand), Fondation ResPublica, Paris, septembre 2013.

[46] http://www.european-solidarity.eu/

Source : Russeurope, Jacques Sapir, 04-11-2016

Hacker NewsThe Russian “Firehose of Falsehood” Propaganda: Can we do anything to weaken it? [pdf]
Ars TechnicaNintendo Switch’s identity crisis could echo Microsoft’s Kinect disaster

Enlarge / Ars' Kyle Orland tries out the Nintendo Switch in its portable mode. (credit: Jennifer Hahn)

After multiple hands-on events around the world on Friday, press and fans alike now have an idea of how the Nintendo Switch plays and feels. It has games (though not many new ones). It has a nice screen and a slim portable form factor. It has an interesting controller proposition.

Underlying all of those, however, is a problem. The Nintendo Switch has an identity crisis. Worse, Nintendo is actively pumping fuel and fire into this problem. The company's confusing—and apparently stubborn—system launch strategy revolves around a packed-in peripheral that adds cost, bulk, and use-case confusion, and it goes so far as to point out the system's technical limitations.

This is the kind of problem that should seem incredibly familiar to fans of the gaming industry. That's right: Nintendo is on the verge of its own Kinect-like moment.

Read 19 remaining paragraphs | Comments

roguelike developmentWhat do you consider the differences between Roguelikes and Roguelites?

I'm attempting to make a (comparatively) small rogue-like as a bigger challenge. Problem is I want this to be a true rogue-like rather than a rogue-lite and as I've had experience almost exclusively with rogue-lite games (such as Binding of Isaac and Nuclear Throne) I'm worried I'll fall into those old trappings and start making a roguelite.

So in order to try and manage myself I want to know what you think differentiates a roguelike from a roguelite.

submitted by /u/Bob-the-Seagull-King
[link] [comments]
Ars TechnicaMicrosoft tells corps to remember XP, migrate away from Windows 7 sooner than later

Windows 7's extended support ends on January 14, 2020. The operating system left mainstream support in 2014, meaning that for the last two years—and next three—it only receives security fixes. But Microsoft is telling corporate customers that even with those security updates, the 2009 operating system isn't really cut out for the world of today. According to Redmond, enterprises should plan to move to Windows 10 sooner, rather than later.

The reason, according to Markus Nitschke, head of Windows at Microsoft Germany, is that Windows 7 "does not meet the requirements of modern systems, nor the security requirements of IT departments."

There are two elements to this. Companies buying new hardware using Intel's Skylake or Kaby Lake processors have little choice but to use Windows 10. Installation and driver support for Windows 7 and 8.1 is limited to certain systems since changes in the Skylake platform, such as the integrated USB 3 controllers and processor-controlled power management, aren't supported in Windows 7. PC OEMs can still make the older operating system work, but it requires extra effort on their part. AMD's new Ryzen processors and Windows machines built using the Qualcomm 835 processor will similarly need Windows 10.

Read 5 remaining paragraphs | Comments

Hacker NewsThe Surprisingly Modern Tech inside an Amish Horse-Drawn Buggy
Hacker NewsEngineers Salary Data
Daring FireballSamsung Heir Faces Arrest on Charges of Bribing South Korea’s President

Chow Sang-Hun, reporting for the NYT:

The sprawling investigation into President Park Geun-hye of South Korea took a dramatic turn on Monday with word that prosecutors were seeking the arrest of the de facto head of Samsung, one of the world’s largest conglomerates, on charges that he bribed the president and her secretive confidante. […]

Mr. Lee is accused of instructing Samsung subsidiaries to make payments totaling 43 billion won ($36 million) to the family of Ms. Park’s confidante, Choi Soon-sil, and to two foundations that Ms. Choi controlled, in exchange for help from Ms. Park in facilitating a father-to-son transfer of ownership control of Samsung.

Shocking that something like this would happen to a company as morally scrupulous as Samsung. Shocking.

Daring FireballApple Insider: ‘Safari Not Able to Play New 4K Videos From YouTube Homepage, Likely Due to VP9 Shift’

Mike Wuerthele, reporting for Apple Insider:

What appears to be Google’s shift to the VP9 codec for delivering 4K video on the YouTube homepage is preventing Safari users from watching videos uploaded to the service since early December in full 4K resolution, but not from viewing webpage-embedded videos in the same resolution.

The shift appears to have taken place on Dec. 6, according to a Reddit thread delving into the issue. Google has been pushing the open and royalty-free VP9 codec as an alternative to the paid H.265 spec since 2014, but has never said that it would stop offering 4K video on the YouTube site in other formats, like the Apple-preferred H.264.

I’m curious what Google’s thinking is here. My guess: a subtle nudge to get more Mac users to switch from Safari to Chrome. 4K playback is going to require H.264 support if they want it to work on iOS, though.

Hacker NewsAstronaut.io
Game WisdomThe Brilliant Dumbness of Shadow Warrior 2

The Brilliant Dumbness of Shadow Warrior 2 Josh Bycer josh@game-wisdom.com

Shadow Warrior has never been a serious series; if the title character “Lo Wang” didn’t clue you in. When Flying Wild Hog took over the series, we weren’t expecting to get a dumb, but fun shooter. With Shadow Warrior 2, they have taken things further both in terms of design and humor. Even though it’s not firing on all cylinders like Doom, Shadow Warrior 2 actually elevates FPS design in a different way.

Shadow Warrior 2 2 560x200 The Brilliant Dumbness of Shadow Warrior 2

Everybody Wang Chung Tonight:

Our story opens up with hero/bad-ass Lo Wang on a mission to recover an artifact for the Yakuza. After demon shenanigans, he finds himself with the soul of a woman stuck inside him as he attempts to save the day and make as many jokes as possible.

If you’re looking for a serious FPS, you can stop reading this review right here. Lo Wang is always cracking wise and the jokes fly as fast as the bullets from your guns. Make sure to wear headphones if you have children nearby, as there are plenty of dirty jokes here. Combat has you going from serene temples to dystopian futures at the drop of a hat.

Shadow Warrior 2 5 300x169 The Brilliant Dumbness of Shadow Warrior 2

Despite the aesthetics, this is as far from a serious shooter that you can get

As you play, you’ll unlock all kinds of weapons categorized by type and ammo. You are free to mix and match weapons however you like; giving you a lot of freedom in terms of destruction. While the first game had an upgrade system, Shadow Warrior 2 takes things even further.

+5 Ass-Kicking:

While it may not look it, Shadow Warrior 2 draws a lot from the RPG genre. Enemies can come in different variants and damage and resistances flash on screen like in Borderlands. Besides finding new weapons, you’ll also find random loot and passive abilities throughout the game.

Weapons can be equipped with trinkets that modify them in some way; with rarer items doing more. From elemental enchantments, reload speed and more damage, the min-maxing is strong here. You can also buy new gear from the various shops and upgrade your skills at level up.

Shadow Warrior 2 4 300x169 The Brilliant Dumbness of Shadow Warrior 2

There are a lot of weapons to use in Shadow Warrior 2

The RPG mechanics are definitely the best (and innovative) aspects of Shadow Warrior 2, but they do dilute the FPS elements compared to Doom.

Lack of Flow:

What made Doom work so well and elevate the design was just how the pacing and the flow worked. Shadow Warrior 2 runs into the classic issue of combining Action and Abstraction design.

Despite featuring set guns, the gunplay doesn’t feel as refined compared to Doom. It’s hard to feel like a bad-ass using a shotgun when enemies shrug off shells and low numbers float over their heads. I wish guns could have had more of an impact on the enemy. Melee is very floaty and can be hard to aim when fighting multiple enemies. The combat never reached that same state of flow that Doom did within minutes of starting the game.

On the RPG side, the game overloads you with loot to the point of distraction. Playing comes to a standstill as you try to figure out what upgrades to add. The game could really use a better UI to quickly see how upgrades compare to what you have equipped. Just like a RPG, I found it easier to just not bother with common items once the magic ones show up.

Shadow Warrior 2 3 300x169 The Brilliant Dumbness of Shadow Warrior 2

This is the first, first person shooter I’ve played to have loot overload issues

While it’s okay to stop and compare items in a RPG or ARPG, Shadow Warrior 2 is a balls to the wall shooter.

While I would have liked weapons that were randomly generated, I can just imagine the increased downtime that would create.

A FPS Grind:

Because of the increased focus on RPG elements, level design has been scaled back compared to other shooters. The levels lack a sense of personality outside of the environment.  The objectives are to either recover an item or kill specific enemies.

Even though you can explore for chests, the best loot comes from fighting rare and epic enemies. The different modifiers on enemies were good, but the enemies lack personality and depth. One wave of charging enemies can be dealt with the same way as the next. Doom was the same way, but there was less focus on the enemies and more on the flow of killing them.

Since you are dealing with DPS and RPG rules, harder enemies can turn into a slog to fight. Elite and boss variants can resist or are immune to specific damage types. These issues do go away to some extent later into the game once you have upgrades and more varied weapons.

Dumb Fun:

Shadow Warrior 2 is the textbook example of “Dumb Fun.” This could have easily been the best old-school shooter of 2016 if not for Doom. Unfortunately, Doom comes out to be the stronger game thanks to the refinements made and the better gameplay loop.

That doesn’t mean Shadow Warrior 2 is a bad game, but I didn’t get the same excitement playing it that I did from Doom. If the developers can refine this concept further, they could be on to the best RPS this side of Borderlands.

Be sure to check out the YouTube channel for daily video content. You can find me on Twitter for daily updates on what’s going on and help support the site via our Patreon Campaign.

The post The Brilliant Dumbness of Shadow Warrior 2 appeared first on Game Wisdom.

Daring FireballAndroid’s Emoji Problem

One practical side-effect of the fact that the overwhelming majority of Android phones are running old versions of the OS: they don’t have the latest emoji.

Daring FireballThe iPhone Unsung Sine Qua Non

Jean-Louis Gassée:

In retrospect, the ascendency of Smartphone 2.0 and the way it has shaped our culture seems obvious and natural. But the celebration and contemplation overlooks a crucial Sine Qua Non, a necessary (but not sufficient) condition: Unlocking the carriers’ grip on handset specifications, marketing, and content distribution.

More specifically, we owe Steve Jobs an enormous debt of gratitude for breaking the carriers’ backs (to avoid a more colorful phrase).

It wasn’t enough that it was revolutionary in both hardware and software. Apple needed something no major handset maker had ever gotten before, or has gotten since: total control.

Ars TechnicaWho’s winning the cyber war? The squirrels, of course

Beware its furry cyber-wrath. (credit: Washington State)

WASHINGTON, DC—For years, the government and security experts have warned of the looming threat of "cyberwar" against critical infrastructure in the US and elsewhere. Predictions of cyber attacks wreaking havoc on power grids, financial systems, and other fundamental parts of nations' fabric have been foretold repeatedly over the past two decades, and each round has become more dire. The US Department of Energy declared in its Quadrennial Energy Review, just released this month, that the electrical grid in the US "faces imminent danger from a cyber attack."

So far, however, the damage done by cyber attacks, both real (Stuxnet's destruction of Iranian uranium enrichment centrifuges and a few brief power outages alleged to have been caused by Russian hackers using BlackEnergy malware) and imagined or exaggerated (the Iranian "attack" on a broken flood control dam in Rye, New York), cannot begin to measure up to an even more significant cyber-threat—squirrels.

That was the message delivered at the Shmoocon security conference on Friday by Cris "SpaceRogue" Thomas, former member of the L0pht Heavy Industries hacking collective and now a security researcher at Tenable. In his presentation—entitled, "35 Years of Cyberwar: The Squirrels Are Winning"—SpaceRogue revealed the scale of the squirrelly threat to worldwide critical infrastructure by presenting data gathered by CyberSquirrel 1, a project that gathers information on animal-induced infrastructure outages collected from sources on the Internet.

Read 6 remaining paragraphs | Comments

Rezo.netiTélé révèle “les petits coups de langue de Montebourg” à Bolloré | Samuel Gontier
« Un événement exceptionnel à vivre sur BFMTV ! », clame la bande-annonce du deuxième débat de la primaire dite « de gauche ». « Les sept candidats se retrouvent pour un débat sans concession. » Cette fois-ci, ça va saigner. « Sept candidats sur le plateau mais un seul vainqueur le 29 janvier… » On dirait Koh-Lanta : « Et à la fin, il n'en restera qu'un », profère rituellement Denis Brogniart. Ça me donne une idée : pourquoi ne pas recourir à l'épreuve des poteaux pour départager les deux finalistes ?
Daring FireballA Russian Journalist on What to Expect Under Trump

Russian journalist Alexey Kovalev, in the wake of Trump’s farcical press conference last week:

Given that Putin is probably a role model for Trump, it’s no surprise that he’s apparently taking a page from Putin’s playbook. I have some observations to share with my American colleagues. You’re in this for at least another four years, and you’ll be dealing with things Russian journalists have endured for almost two decades now. I’m talking about Putin here, but see if you can apply any of the below to your own leader.

Facts don’t matter. You can’t hurt this man with facts or reason. He’ll always outmaneuver you. He’ll always wriggle out of whatever carefully crafted verbal trap you lay for him. Whatever he says, you won’t be able to challenge him. He always comes with a bag of meaningless factoids (Putin likes to drown questions he doesn’t like in dull, unverifiable stats, figures and percentages), platitudes, false moral equivalences and straight, undiluted bullshit. He knows it’s a one-way communication, not an interview. You can’t follow up on your questions or challenge him. So he can throw whatever he wants at you in response, and you’ll just have to swallow it. Some journalists will try to preempt this by asking two questions at once, against the protests of their colleagues also vying for attention, but that also won’t work: he’ll answer the one he thinks is easier, and ignore the other.

Josh Marshall responds:

Trump wants to bully the press and profit off the presidency. He’s told us this clearly in his own words. We need to accept the reality of both. The press should cover him on that basis, as a coward and a crook. The big corporate media organizations may not be able to use those words, I understand, but they should employ that prism. The truth is that his threats against the press to date are ones it is best to laugh at. If Trump should take some un- or extra-constitutional actions, we will deal with that when it happens. I doubt he will or can. But I won’t obsess about it in advance. Journalists should be unbowed and aggressive and with a sense of humor until something happens to prevent them from doing so. Trump is a punk and a bully. People who don’t surrender up their dignity to him unhinge him.

Planet Intertwinglygoing to 4th Annual Sunrise 6K 2017-01-27 06:05; free #race by @Nov_Project_SF! Sign up: https://www.facebook.com/events/607205172796645/ #NPSF
going to 4th Annual Sunrise 6K 2017-01-27 06:05; free #race by @Nov_Project_SF!Sign up: https://www.facebook.com/events/607205172796645/#NPSF
Hacker NewsSpaceX wants to be an ISP
Hacker NewsSpaceX Data Shows Loss in 2015, Heavy Expectations for Nascent Internet Service
Ars TechnicaTrump team reportedly wants to strip FCC of consumer protection powers

Enlarge / President-elect Donald Trump at Trump Tower in New York City. (credit: Getty Images | Drew Angerer)

President-elect Donald Trump's transition team is reportedly pushing a proposal to strip the Federal Communications Commission of its role in overseeing competition and consumer protection.

Multichannel News has what it calls an exclusive report that says the incoming Trump administration has "signed off on an approach to remaking the Federal Communications Commission." The plan, offered by transition team members appointed by Trump, "squares with the deregulatory philosophies of FCC Republicans Ajit Pai and Michael O'Rielly," who will take a 2-1 majority after Trump's inauguration on Friday, the report said.

Besides restructuring FCC bureaus, the majority of the transition team wants to "eventually move functions deemed 'duplicative,' like, say, competition and consumer protection, to other agencies, particularly the Federal Trade Commission," Multichannel news reported. The story cites "sources familiar" with a recent meeting involving Trump officials and FCC transition team members. The Trump team has not made any on-the-record statements about specific plans for the FCC.

Read 8 remaining paragraphs | Comments

Planet IntertwinglyTop five Internet of Things trends for 2017
Top five Internet of Things trends for 2017 #IoTTop five Internet of Things trends for 2017IBM Technical Rock Star Program
Ars TechnicaDeaf people use their auditory cortex to process visual rhythms

The image shows a 180-area multimodal human cortical parcellation on the left and right hemisphere surfaces. Colors indicate the extent to which the areas are associated in the resting state with auditory (red), sensation (green), visual (blue). (The brain, continuing to amaze us.) (credit: http://www.nature.com/nature/journal/vaop/ncurrent/full/nature18933.html)

The brain can reorganize itself in the face of a traumatic injury or a sensory disability. For example, in deaf mammals, the auditory processing neurons of the brain may be rewired to handle other stimuli. But we haven’t been able to figure out if this reorganization is task-specific—will the circuits be recruited to do the same tasks?—or more general.

A recent study published in PNAS suggests that, in at least one case, these brain circuits are repurposed for a similar task. When deaf people were asked to interpret visual rhythms (represented by a flashing light), then the same auditory processing regions used to listen to rhythms were activated.

This study used fMRI to look at the brain activation of both congenitally deaf subjects and those with normal hearing. While in the fMRI machine, all subjects were asked to discriminate between different rhythms of flashing lights. As a control, all subjects were also asked to look at a light that flashed with a regular, predictable pattern. Hearing subjects were then asked to discriminate between different auditory rhythms as well. As a control, these subjects were asked to listen to a similar noise occurring in a regular, consistent pattern.

Read 6 remaining paragraphs | Comments

Hacker NewsLets Encrypt has issued 709 SSL Certificates containing “PayPal”
Hacker NewsPeople.ai (YC16) Is Hiring in Engineering, Sales and Customer Success
Ars TechnicaOculus accused of destroying evidence, Zuckerberg to testify in VR theft trial

John Carmack, seen here wearing an early prototype Oculus Rift headset.

ZeniMax Media, the parent company of both Bethesda Softworks and Id Software, says it will prove at trial that John Carmack and others at Oculus stole trade secrets to "misappropriate" virtual reality technology that was first developed while Carmack was working at Id Software. What's more, ZeniMax is now accusing Oculus of "intentional destruction of evidence to cover up their wrongdoing." Mark Zuckerberg, CEO of Oculus parent company Facebook, is scheduled to respond to those accusations in testimony starting tomorrow, according to a report by Business insider.

"With the start of the trial of our case in Federal District Court in Dallas against Defendants Facebook, Oculus and its management, ZeniMax and id Software welcome the opportunity to present substantial evidence of the Defendants' misappropriation of our Virtual Reality (VR) intellectual property," ZeniMax wrote in a statement given to Ars.

"That evidence includes the theft of trade secrets and highly confidential information, including computer code. ZeniMax will also present evidence of the Defendants' intentional destruction of evidence to cover up their wrongdoing. ZeniMax and id Software are the visionary developers of breakthrough VR technology and look forward to the vindication of our claims."

Read 7 remaining paragraphs | Comments

Ars TechnicaUS Department of Energy strengthens protections for its researchers

Enlarge / The policy was announced last week by nuclear physicist and DOE Secretary Ernest Moniz, who will be replaced by former Texas Governor Rick Perry if he is confirmed by the Senate. (credit: Thomas Kelsey/U.S. Department of Energy Solar Decathlon)

When President-elect Donald Trump’s transition team sent a questionnaire to the Department of Energy asking, among other things, for the names of employees who had worked on anything that touched climate policy, it raised concerns about whether those employees would be targeted. (The transition team later said the questionnaire was “not authorized.") Thanks to a new Department of Energy policy announced last week, that sort of political interference should be (at least a little) harder to do going forward.

The new policy has its roots in a 2009 President Barack Obama memo directing agencies to craft “scientific integrity” policies that protect research staff from having their work censored or altered or prevent researchers being muzzled themselves. Twenty-four departments and agencies have followed through with such policies, but the Department of Energy’s version was a little vague and weak. The newly finalized policy is stronger, earning praise from the Union of Concerned Scientists.

The policy now clearly covers all staff at the Department of Energy's 17 national laboratories around the country, including employees of contractors and university researchers funded by DOE grants. They are free to share research findings with the public and other scientists and “are free to discuss their personal opinions on scientific and technical related policies, provided these views are not represented as those of the US Government or DOE.” There are explicit exceptions for classified information given the department’s nuclear work.

Read 2 remaining paragraphs | Comments

Hacker NewsShow HN: JSON Browse – Fetch, filter and manipulate your JSON inside the browser
Planet IntertwinglyDisentangling the FileNet parts
I decided to try and figure out all the names/code/interactions of FileNet/Connections/Docs, you may find it useful: In summary: Connections uses the following code: CCM:  IBM Connections Content Manager - this includes the following:    - IBM FileNet Content Engine    - IBM FileNet Content Engine Client ICN:  IBM Content Navigator - This includes both FNCS and FNCMIS (Connections uses FNCS) Docs uses the following: FileNet:  FileNet Content Engine is assumed to be installed ICN:  IBM Content Navigator - This includes both FNCS and FNCMIS (Docs uses FNCMIS)   Interaction: Connections >>    ICN-FNCS >> FileNet client >>    FileNet Engine(server) Docs >>                ICN-FNCMIS >>                           FileNet Engine(server)   Name What is it? Details CCM - Connections Content Manager It is Connections' packaging of FileNet for Connections. It is really just packaging for FileNet from Connections (however it does not include the actual connector code which is FNCS): IBM Connections Content Manager V5.5 for IBM Connections Suite V5.5 Multiplatform Multilingual eAssembly (CRY8NML) - IBM FileNet Content Engine V5.2.1 Windows Multilingual (CN216ML ) - IBM FileNet Content Engine Client V5.2.1 Windows English (CN225EN )   ICN - IBM Content Navigator This is FileNet name that includes FNCS and FNCMIS code (Also includes web client access) It is included in this eAssembly: IBM Content Navigator V2.0.3 for IBM Connections Enterprise Content Edition (CECE) V5.2 Multiplatform Multilingual eAssembly (CRVX7ML) - IBM Content Navigator V2.0.3 Windows Multilingual (CN0PVML )   FNCS - FileNet Collaboration Services FNCS is now part of ICN CCM uses FNCS to integrate Connections Libraries and FileNet(ECM) Listed in WebSphere ISC / Applications as navigator - Logs are in Connections systemout - Location of FNCS version info and install logs: C:\IBM\Connections\FNCS\version.txt   FNCMIS / CMIS - FileNet Content Management Interoperability Services CMIS is now part of ICN - Enables applications that use the OASIS CMIS standard to work with content that is stored on FileNet Content Engine.   Listed in WebSphere ISC / Applications as fncmis ECM - Enterprise Content Management - CPE - Content Platform Engine - FileNet Content Manager - FileNet - P8   Core FileNet content management engine Listed in WebSphere ISC / Applications as FileNetEngine - FileNet logs: C:\IBM\WebSphere\AppServer\profiles\AppSrv01\FileNet\ICCluster_server1\   - p8_server_error.log    - p8_server_trace.log   - pesvr_system.log    - pesvr_trace.log Location of FileNet server in 5.5 also version info and install logs: C:\IBM\Connections\FileNet\ContentEngine\ Content Engine Client Used by FNCS to connect to FileNet server Location of FileNet client in 5.5 also version info and install logs: C:\IBM\Connections\FileNet\CEClient
Ars Technica“We aren’t born woke, something wakes us up“—maybe it’s Twitter, says activist

The Texas Tribune kicked off its weekend symposium by interviewing activist DeRay Mckesson. (credit: Texas Tribune)

AUSTIN, Texas—“We aren't born woke, something wakes us up."

By now, everyone's experienced a newsfeed full of #NoDAPL or long Twitter threads explaining some proposed legislation that threatens a certain cause. With years of social media experience behind us, it's easy for this stuff to feel like white noise. But the next time someone shrugs off any of these posts in the name of social justice as useless, tell them DeRay Mckesson begs to differ. All of it has the ability to help others get "woke," to newly realize there's a problem and a need to combat it. So during his keynote Q&A at the Texas Tribune's weekend symposium on race and policy, the Black Lives Matter activist encouraged everyone to fight toward “equity, justice, and fairness” in the way that works best for them... even if starts as small as a tweet.

For Mckesson, in fact, social media initially proved to be the way of getting involved. Back in August 2014 after the tragic murder of Michael Brown, he wanted to go to Ferguson, Missouri, and merely participate in the peaceful response for a weekend. He had no grand plans of country-wide organizing at the time; then the protests spanned 300 days: “I drove nine hours for a weekend, but I guess it's been a long weekend,” Mckesson said of his work since.

Read 11 remaining paragraphs | Comments

Hacker NewsAsk HN: How do you offer your startup employees 100% health insurance?
Hacker NewsGit-quick-stats – A simple and efficient way to access various statistics
Hacker NewsEU: Robot Workers Are 'Electronic Persons'
Planet IntertwinglySuggestions for reducing assigned participant groups against MS SQL Server
  The article will give your some suggestions for reducing assigned participant groups against MS SQL Server based on a real case. Background: When you are running Business Process Manager (BPM) V8.0.1.3, you might hit the following exception when searching instances by user through Process Inspector: [10/13/15 16:14:04:184 CST] 00000313 RestHelper    3   Encountered exception has message: count query returned no rows com.lombardisoftware.client.delegate.BusinessDelegateException: count query returned no rows at com.lombardisoftware.client.delegate.BusinessDelegateException.asBusinessDelegateException(BusinessDelegateException.java:41) at com.lombardisoftware.client.delegate.ProcessSearchAPIDelegateDefault.executeCountQuery(ProcessSearchAPIDelegateDefault.java:213) ...... Caused by: com.lombardisoftware.core.TeamWorksException: count query returned no rows at com.lombardisoftware.server.core.pse.impl.ProcessSearchEngineImpl.executeCountQuery(ProcessSearchEngineImpl.java:447) at com.lombardisoftware.server.core.pse.impl.ProcessSearchEngineImpl.executeCountQuery(ProcessSearchEngineImpl.java:344)   The query with ifix will run correctly with DB2 and Oracle. However, if you are using Database MS SQL Server, you will still get the following exception: nested exception is com.microsoft.sqlserver.jdbc.SQLServerException: The incoming tabular data stream (TDS) remote procedure call (RPC) protocol stream is incorrect. Too many parameters were provided in this RPC request. The maximum is 2100. at com.lombardisoftware.server.core.pse.impl.ProcessSearchEngineImpl.executeCountQuery(ProcessSearchEngineImpl.java:455)   The new exception shows a limitation for MS SQL Server to have a maximum of 2100 parameters: "nested exception is com.microsoft.sqlserver.jdbc.SQLServerException: The incoming tabular data stream (TDS) remote procedure call (RPC) protocol stream is incorrect. Too many parameters were provided in this RPC request. The maximum is 2100." So we need to reduce the parameter which is the assigned participant groups below 2100.   In order to reduce the number of assigned participant groups below 2100, some snapshots which are no longer required can be cleaned up. The background on this step is that each snapshot has it's assigned participant groups. When removing the snapshots, the assigned groups will also be removed. Thus it can reduce the number of groups that are included for the SQL statement being executed.   For the snapshot cleanup, it is advisable to keep the number as low as possible, as the snapshot information is included in a number of queries. Thus less data will result in better performance. Of course one needs to keep in mind what is required from a business perspective, e.g. if there are still active process instances. However archiving of completed work should be done outside of the product database, to keep the runtime database slim. Concerning the database entries, the developer just sent some SQL statements to get an idea what data is stored in the database. You can find the MS SQL Server version here, these need to be run against the BPMDB database. The SQL statements are provided as a txt zip file by stephan.volz@de.ibm.com and he welcomes any feedback: SQLServer_ProcessInstances_Tasks.txt.zip     So what you need to do in order to reduce the assigned participant groups below 2100: 1. Check whether you have installed the mandatory ifixes for snapshot deletion. There are some mandatory ifixes for snapshot deletion, please check whether they are installed before doing delete operation. You can refer to Issues with BPMDeleteSnapshot and BPMSnapshotCleanup commands in IBM Business Process Manager (BPM).   2. Run the SQL in the above attachment to have an overall idea about the data in your database.   3. Delete the snapshot. In the BPMDB database, the snapshot data is stored in table LSW_SNAPSHOT. You can simply get the total number of snapshots by using the sql statement: select count(snapshot_id) from  LSW_SNAPSHOT.   Please note that you may have to determine which ones need to be deleted, but the above SQL statements (the ones provided by developer in the attachment) should list the snapshots that have process instance, thus the ones not listed there could be good candidates. Also cleanup is roughly covered in article Purging data in IBM Business Process Manager.   If you are not using MS SQL server, you can also modify your specific SQL by referring to the above SQL statement to get an idea what data is stored in the other type of database.  
Hacker NewsBiometrics leads to arrest of accused child molester on the lam 17 years
Hacker NewsRemembering Gene Cernan (1934-2017), Last Person to Walk on the Moon
Ars TechnicaGlobally, fossil fuels subsidies are sticking around

Enlarge (credit: Wisconsin.gov)

With the Paris climate agreement, participating nations have made a commitment to curb greenhouse gas emissions caused by burning of coal, oil, and gas. Removing subsidies for fossil fuels is thought to be one of the most-cost-effective methods of progressing towards that goal. Implementing taxes on these energy sources would go further, but for now, it would be progress if we could just stop making it artificially inexpensive to use fossil fuels.

Unfortunately, it is unclear if these recommendations are being followed, since government self-reporting has been incomplete and unreliable. Without a consistent way to measure these taxes and subsidies, it is difficult to determine whether any progress has been made towards fossil fuel price reform.

Get gas

In a new investigation, a team of researchers used monthly data on retail gasoline prices in countries across the world to determine the net tax or subsidy placed on a liter of gasoline by their governments. Since gasoline is sold directly to consumers in all countries, retail prices provide an indication of underlying costs. And the cost of gasoline is relatively constant; country-to-country differences in gasoline quality are minimal and the price of oil acts as what's effectively a single world reference price. So it's possible to use the data to understand the influence of policy changes on gasoline consumption.

Read 10 remaining paragraphs | Comments

jwzPortal for Apple ][

Portal for Apple ][

While attempting to travel to the future to get a copy of Portal 3. I accidentally traveled to alternate-1987 and obtained a copy of Portal 1 for the Apple II!

In actuality I originally just planned to do the end credits. But the Apple II high-res mode has the perfect Aperture Science orange and blue colors, and one thing led to another...

Source code. 13k.

Previously, previously, previously, previously, previously, previously.

Hacker NewsWith Google's RAISR, images can be up to 75% smaller without losing detail
Hacker NewsWebSlides – Making HTML presentations easy
Rands In ReposeThe One About Pens

I’ve started a podcast.

Each episode, I find a smart person somewhere on the planet, and we talk about The Important Thing. I suspect we’re going to wander a bit, but wandering is usually the best part.

I’m just delighted to kick off the first episode1 with Tiff Arment where The Important Thing is pens2. In this first episode, we talk pen origin stories, we dive deep on fountain pens, and, uh, we talk video games, too.

Enjoy it now or download for later:

  1. Wow. There are a lot of moving parts in setting up a podcast. This is a beta release and I continue to tinker with all the things. Special thanks to Marco Arment for saving my ass no less than three times during this process. I’m working on getting The Important Thing feed posted to all the usual places. If you’ve done such a thing within WordPress, please join the #theimportantthing channel on the Rands Leadership Slack and let’s chat. 
  2. Tiff provided this amazing shot of the pens we discuss. 
Ars TechnicaBiometrics leads to arrest of accused child molester on the lam 17 years

Enlarge / Nearly two decade old photos of a suspected child molester matched a 2007 passport photo via a biometrics analysis by the FBI, leading to Charles Hollin's arrest in Oregon. (credit: FBI / Aurich Lawson)

A fugitive suspected of molesting a 10-year-old Indiana girl 17 years ago has been arrested after the Federal Bureau of Investigation employed facial recognition technology, according to court documents. The bureau said the suspect's US passport photo in December was run though a Facial Analysis, Comparison, and Evaluation (FACE) test, and it matched photos taken before he disappeared nearly two decades ago.

Charles Hollin, 61, was arrested in Salem, Oregon, last week, at a Wal-Mart where he works. He had a Minnesota and a Oregon driver's license with his picture on it. The agency said it did not perform a biometrics analysis with those databases because they have not opened up their DMV roles for the bureau to search. The bureau noted in a court filing that the government maintains "top secret" databases containing biometric profiles.

"The Department of Motor Vehicles for Minnesota and Oregon were not searched due to the fact it was prohibited by law. Additional searches were conducted in various federal secret and top secret databases. All of these searches were negative," Todd Prewitt, an FBI agent, wrote in court documents. (PDF)

Read 4 remaining paragraphs | Comments

Planet IntertwinglyIBM TPF Toolkit Interim Fixes are now available
IBM TPF Toolkit Interim Fix v4.2.9 is now available on the update site.  For additional information, please see the announcement. There are a number of migration consideration in this interim fix, so please pay extra attention to the migration information in the service.html file provided with the interim fix.   In addition, a YouTube channel has been started for IBM TPF Toolkit and two videos have been uploaded related to the content of this interim fix. Installing IBM ZOS Connect EE API Editor provides a walk-through for installing IBM Explorer for z/OS and the z/OS Connect EE API Editor which is required for native REST services on z/TPF. Creating Native REST Artifacts for zTPF provides an overview for creating the artifacts required to implement a native REST service on z/TPF.   If there is any specific content that you would like to see covered in future videos, please let us know.
Hacker NewsMoxie Marlinspike Receives RWC Levchin Prize 2017 for Signal Protocol Invention
Hacker News2017 Levchin Prize for Real World Cryptography
Planet IntertwinglyDrone Package Delivery (RECIPE)
Drone Package Delivery (RECIPE)Drone Package Delivery (RECIPE)IBM Technical Rock Star Program
Hacker NewsBefore you start a company, answer these questions
Hacker NewsPopular porn sites blocked in Philippines
Planet IntertwinglyConfiguring IBM MobileFirst Studio for Maximo Anywhere 7.6.1
I was recently asked for some detailed documentation regarding setting up and using the MobileFirst studio to preview\demo Maximo Anywhere 7.6.1 applications.  Other then the Knowledge Center which gives a basic guideline, there isn't much out there that goes over the process in detail. So in this blog I'm going to go through the configuration of MobileFirst Studio in eclipse, importing the Maximo Anywhere application in to the eclipse workspace, building the applications as well as some of the configuration tasks required.  This is a step by step, so please read the entire blog,  as it is quite long.    Before we start this document assumes you have the following downloaded and installed.    1.  Eclipse Kepler SR2 2 . Maximo Anywhere 7.6.1 is installed and the MobileFirst install components still extracted in the Anywhere install folder. 3.  Java 1.7 or 1.8 is installed and the JAVA_HOME environment variable is set.   So lets get started !   1. Before we start up eclipse,  one issue you may run in to when using Studio is java heap errors,  the reason for this is the OOB maximum heap is 256 MB and needs to be increased.  From the root of the eclipse folder open the eclipse.ini and change the -Xmx256m to -Xmx1024m as you see in the screenshot below.      Once the file is updated and saved, run the eclipse.exe that is the same directory.   2. You will first be prompted to create a workspace, the default folder name is workspace and goes to your user folder, as I have multiple instances on this machine, I've created and named my workspace 'MaximoAnywhere761' as seen below, you can also change the root path of the workspace if required.       3.  Once your work space is opened you will see a blank project,  select 'Help' and then click on 'Install New Software'.     4. You will now be brought to the install prompt, you will see no current packages.  Click on the 'Add'  button to point to the MobileFirst Studio package repository.      5.  Click on the 'Archive' button.     6.  This will open a File Explorer window,  you will browse to the MobileFirstStudio.zip.  This zip should be in your Maximo Anywhere install folder, it is copied over with the MobileFirst component.  Use the path below as a guide.      7.  Give the repository a name, this can be anything and click ok.     8.  The MobileFirst Platform Studio Development tools should now show, ensure all options are selected and click next and finish.  The tools will install and you will be prompted to restart the Eclipse application.     9. Once eclipse is re-opened, you will see the MobileFirst Development server in your project.  You now want to bring your ant view to the main screen.  You can do this by clicking on 'Window' then select 'Show View' and then click on 'Other'   10. Click on the 'Ant' icon and click OK.       11.  Now that we have set up the Ant view we want to import the Maximo Anywhere project in to the workspace.  From the 'File' menu select 'Import'.     12. Select 'Existing Projects into Workspace'.   13.  On the import screen, click on 'Browse' and point to the root Anywhere folder, this will then display the projects underneath. Select the MaximoAnywhere checkbox which is your Maximo Anywhere build folder.  You will also want to check the 'Copy projects into workspace' box.  The reason to do this, is to keep this folder separate from your live build folder and prevent development changes from being pushed directly to a running application.  The files will copy to the workspace folder we created when opening eclipse. Click Finish.     14. Once complete you will now see the Maximo Anywhere project above the MobileFirst Development Server,  expanding this will show the Maximo Anywhere build structure.   15.  To be able to access the build scripts from eclipse and run them, we can copy the build.xml over to the Ant view as seen below.     16. After this we will want to deploy the OSLCGenericAdapter to the MobileFirst Development Server.  The OLSC Adapter contains your Maximo connection and adapter time out values.  Expand 'adapters' then right click on the 'OSLCGenericAdapter' folder,  move to 'Run As' in the menu and select 'Deploy MobileFirst Adapter'.     17.  Once the deploy is finished you will see the following message, this will deploy to the development MobileFirst server which runs on port 10080.   The address would be http://localhost:10080/worklightconsole .  To log in to the admin console that deploys with MobileFirst studio the password is admin\admin.     18.  We can now build one of the Anywhere applications in a similar way, lets do Work Execution on Android for this example.   Expand the 'apps' folder, then 'WorkExecution' and right click on the 'Android' folder. Once it completes successfully, you will now see the Work Execution application deployed to the MobileFirst Development console.        19.   To log in to the console, you can access via the hostname externally or localhost on the server with the following address; http://localhost:10080/worklightconsole .  The log in will be admin\admin.  You will see your application deployed as shown below, as well as the adapter previously deployed. It is recommended you access the application via a Chrome incognito window, click on the folder icon to bring up the preview menu.     20.  Click on 'Preview Version' and your application will launch,  assuming your security groups are setup correctly you can log in to the application with a user added to the ANYWHERE_TECHNICIAN group.     You will see the log in screen in the browser as shown  below.  Remember the preview mode limits the amount of data downloaded as the chrome browser can only store so much data.     Now for some other information.    1. As this is a copied folder from the original Maximo build, you will want to ensure your your applications do not build to the worklight server you are using for your live development or production applications.  Changes should be pushed and built from the original folder after development and testing to ensure changes are working correctly before introduction to users. Open the build.properties from the eclipse tree and modify the port to 10080,  you can update he user and password as well to admin\admin and running the ant scripts will then build and deploy to the development server.      2.  Application screens can be modified and tested via eclipse, to modify resources and fields you can open the app.xml for the associated application from the Maximo Anywhere project tree under apps/WorkExecution/artifacts, replace WorkExecution with the application you are modifying.  You can find more information on basic modifications in our Knowledge Center.     3. From the output window you can stop and server the MobileFirst Development sever, click on the 'Servers' tab then right click on 'MobileFirst Development Server' for available stop, start and restart options.     4. If using Java 1.8,  you will need to update the ant home to point to the ant directory in the Anywhere folder which supports this version of Java.  Click on 'Windows' -> 'Preferences' and expand 'Ant' and click on 'Runtime'.  Select the 'Ant Home' button and point to the Maximo Anywhere ant folder.  e.g Anywhere\MaximoAnywhere\build\tools\ant\bin.       I know this was a long read, but this should help users get eclipse and MobileFirst Studio running for Maximo Anywhere 7.6.1, the steps are also very similar for previous versions.  For Maximo Anywhere 7.6.1 it is required to use the MobileFirst Studio if you wish to preview and demo applications outside of the device.  As always please advise if there are any questions, comments or concerns.      
Hacker NewsStudy Finds Link Between Profanity and Honesty
Hacker NewsAsk HN: Do you wear ear protection or noise cancelling headphones while working?
Hacker NewsAI Pioneer Wants to Build the Renaissance Machine of the Future
Hacker NewsThis “genderless nipples” account is throwing off Instagram's algorithm
Planet IntertwinglySorry but you can make a blog for free
It seems that everyone can make a free blog here :|
Hacker NewsWebpack 2, RC 7
Hacker NewsBalaji Srinivasan, Trump's FDA Pick, Hates the FDA. But Silicon Valley Likes Him
Hacker NewsThe Machine to free us all
Hacker NewsThe first humans arrived in North America a lot earlier than believed
Hacker NewsEasy XMPP: What are we doing here?
Hacker NewsFighting the Borrow Checker
Hacker NewsMIT 6.S094: Deep Learning for Self-Driving Cars
Ars TechnicaRaspberry Pi upgrades Compute Module with 10 times the CPU performance

Enlarge / Raspberry Pi's upgraded Compute Module. (credit: Raspberry Pi Foundation)

The Raspberry Pi Compute Module is getting a big upgrade, with the same processor used in the recently released Raspberry Pi 3.

The Compute Module, which is intended for industrial applications, was first released in April 2014 with the same CPU as the first-generation Raspberry Pi. The upgrade announced today has 1GB of RAM and a Broadcom BCM2837 processor that can run at up to 1.2HGz. "This means it provides twice the RAM and roughly ten times the CPU performance of the original Compute Module," the Raspberry Pi Foundation announcement said.

This is the second major version of the Compute Module, but it's being called the "Compute Module 3" to match the last flagship Pi's version number.

Read 5 remaining paragraphs | Comments

Planet IntertwinglyThe Crummy.com Review of Things 2016: Accomplishments
Library Work: In 2016 SimplyE went from a two-developer team with me as backend guy, to a seven-developer team with me as architect. We launched the SimplyE reader for NYPL patrons and started work on rolling it out to other libraries across the country. We also launched the Open Ebooks project, which led to our brush with power. I'm not comfortable bragging about the SimplyE product because it needs a lot of improvements, and I feel like saying how nice it is will lead to people thinking (or at least asserting) that I'm okay with the status quo. But if you compare it to the status quo ante, it's really damn good. We took checking out an ebook from a 17-step process to a 3-step process. And I'm totally happy bragging about the team, which is incredible. For the first time I ran a bunch of job searches and decided who to hire, and I think the past year's work has proven I made good choices. At the end of the year, NYPL recognized our team with a Library Leadership Award! To the right is our official team photo (two of the developers are not pictured). I think this is an incredible achievement for a team that basically didn't exist a year ago. Writing: Late 2015 I pitched a number of novels to my agent and we decided on Mine, a Rendezvous with Rama type political thriller. Lately, though, I'm haunted by the pitch I wrote for Nice Things, a novel about the fascist takeover of the Federation. Sometimes when I sit down to write Mine I feel like I should be writing Nice Things instead, but most of the time I'm glad I'm working on absolutely anything else. Progress on Mine is slow but steady. But slow. My increased responsibilities at the library haven't been good for writing time. Short stories I wrote in 2016 include "Quest For Boredom" (which I... supposedly sold??? but haven't heard back), "The Girls Boys Don't Notice" (possibly the best title I will ever come up with), "Fool, Professor, Peasant, King", and the unsellable "Unicode Changelog", which I might self-publish. Situation Normal is still on the Desks of Editors. Bots: I've drastically scaled down my use of Twitter because I don't like what it does to my brain. As a corollary, I don't really like that my whimsical software encourages people to spend more time on Twitter. So I've stopped putting bots on Twitter. Also, Twitter randomly suspends my bots without telling me. After the completely innocuous Vintage Groaners was suspended, I decided it wasn't worth the hassle. I've thought about taking down my bots in a fiery cataclysm, rather than letting Twitter pick them off one by one, but a lot of people get happiness from Minecraft Signs, Hapax Hegemon, and (finally!) Smooth Unicode, so I'll commit to keeping the big ones working at least. I have a solution in mind for my computational creativity going forward, but I'm pretty damn busy so it's going to be a while. I've been doing this stuff since 1998 and it's still something I like, so consider this not a goodbot, but rather au botvoir. Here's the 2016 robot roll call: The Lonely Dungeon, my fave of 2016. That's Life! Anniversary Gifts, inspired by my and Sumana's 10th anniversary. The aforementioned Vintage Groaners. Location: Bot Heaven. Ingsoc Party Slogans. I admit that Twitter really is the best medium for this particular idea. A Time of the Day
Ars TechnicaHead of Samsung faces arrest in presidential corruption scandal

(credit: Neilson Barnard / Getty Images)

Lee Jae-yong, the vice chairman of Samsung Group and acting head of the company, could soon be facing formal corruption charges. South Korean prosecutors are currently seeking the arrest of the Samsung heir, accusing him of bribery, embezzlement, and perjury. The warrant must first be approved by a court, which will convene Wednesday.

The accusation sucks Samsung into the ongoing corruption scandal that has rocked South Korea, where impeachment hearings for President Park Geun-hye have already started. Lee is accused of paying bribes to a nonprofit connected to the South Korean president in exchange for approval of a merger of two Samsung Group affiliates—Cheil Industries and Samsung C&T—in 2015. Once merged, the two companies became one of the largest investors in Samsung Electronics, solidifying the Lee family's control over the crown jewel of the Samsung empire. The prosecutor's office estimated that the total size of the alleged bribes was ₩43 billion ($36 million).

The possible arrest of Lee comes at a time when Samsung is still sorting through the Note 7 recall debacle, and it could interrupt Lee Jae-yong's massive ongoing reorganization of Samsung Group.

Read 3 remaining paragraphs | Comments

Ars TechnicaNintendo says Switch won’t replace the 3DS

Enlarge / A Switch Joy-Con sits alongside a 3DS XL, just as Nintendo says the Switch will sit alongside the 3DS in the marketplace. (credit: Kotaku)

With the Nintendo Switch acting as both a fully portable system and a TV-based console, you might think the hardware is intended to serve as a replacement for both the Wii U and the 3DS. But while the Wii U has already been discontinued, Nintendo insists that the 3DS will continue to be supported well into the Switch's lifespan.

"In our view, the Nintendo 3DS and the Nintendo Switch are going to live side-by-side," Nintendo of America President Reggie Fils-Aime told Wired in a recent interview. "They’re going to coexist just fine. We’ve done this before, managing two different systems."

While it's definitely true that Nintendo has managed two (or more) systems at the same time in the past, it usually doesn't maintain two portable systems concurrently for very long. Back in 2004, for instance, Nintendo revealed the Nintendo DS as a "third pillar" in its hardware line up, alongside the existing Game Boy Advance and GameCube platforms.

Read 4 remaining paragraphs | Comments

Hacker NewsIn Snap IPO, New Investors to Get Zero Votes While Founders Keep Control
Ars TechnicaThe best of the rest from the 2017 North American International Auto Show

Jonathan Gitlin

DETROIT—The North American International Auto Show in Detroit has a bit of a problem. You see, CES takes place in the days directly before it, and in recent years automakers have started making big announcements in Las Vegas. This also affects the annual Los Angeles Auto Show (which takes place in November), but the effect is more pronounced at Detroit. The result—in my view at least—is three underwhelming events in a row. That's not to say there weren't big announcements in Detroit. It doesn't get much bigger than Toyota's eighth-generation Camry or BMW's seventh-generation 5 Series, for example.

We've covered the headliners already, so the gallery here represents all the little wonders we stumbled across in Cobo Hall. There was a face-lifted Ford F-150, the cabin of which was more Range Rover-like than ever. The venerable F-150 is Ford's top seller, and the refreshed 2018 model gets a full complement of advanced driver assists.

Read 8 remaining paragraphs | Comments

Planet IntertwinglyHigh Growth Prospects for 2017
  2017 has arrived, and already the markets are gearing up for many exciting innovative opportunities. One of the fastest growing industries in the world is Fintech. Simply put, this is financial technology, and it is making waves everywhere. Silicon Valley is driving the Fintech revolution, with many world-class innovations coming out of Asia too.  Investors, entrepreneurs, and traders are excited about the prospects in banking, finance, credit, and other industries. Concepts like crowdfunding were nothing more than a pipe dream years ago, but today they’ve gained traction in the financial markets. This is an excellent example of financial technology at its best. Below the surface, Fintech is operating on a global scale. Cybersecurity is an example of one such multibillion-dollar industry.   Mobile Biometrics for Payment Processing Safety and security is essential in the Fintech arena. To this end, payment security measures are likely to include biometric-enabled smartphones to protect against hackers. A fingerprint, facial scan or Iris scan will act as an additional security measure to guard against interception of data. The payments processing industry is increasingly at risk with hackers stealing information at every juncture. Biometric software designed for mobile phones will make it increasingly difficult for hackers to steal sensitive personal information.     Plastic Is Becoming Redundant Traditional plastic will always have high utility value in society, but credit cards are quickly losing their appeal. Much the same is true of debit cards. It is already evident that Smart Pay Technology has widespread usage across Europe, the US and Canada. People can now load up sensitive credit card information and then have various apps make payments at point-of-sale terminals, or via online transactions.   It is no longer necessary to carry debit cards and credit cards with you on your shopping expeditions. A mobile phone has replaced a traditional wallet in every sense of the word. By 2021, ABI Research estimates that contactless cards will double on a global scale. In 2017, people are going to be leaving their credit cards at home and using their mobiles for payments processing at merchants.   Contactless digitized payments are gaining widespread acceptance around the world. This is going to be a major disruptive force for banks, credit card companies and the money supply in general. This is an area where huge profits stand to be gained in the Fintech arena.     Money Transfer Services No Longer Controlled By Banks It comes as no surprise that banks are losing favor in 2017. Sure, banks will always have a part to play in the macroeconomy, but on a personal level massive changes are underway. For example, money transfer services are now increasingly being conducted outside of the traditional banking sector. The reason for this is clear: Banks are too expensive.   The rates that banks charge on foreign currency transfers, sending and receiving money (incoming and outgoing wires) are extortionary. According to the world remittance market overview banks are losing out to alternative money transfer companies. Given the massive size of this industry, it makes sense that alternatives are cropping up left, right and center. Remittances are payments sent from a citizen abroad to his or her home country.   This industry has grown in leaps and bounds. The increasing mobility of the labour force, coupled with massive urbanization is fueling the movement of migrants globally. The top five countries receiving remittances include India, China, Philippines, Mexico and France. The value of remittances for those countries alone exceeds $215 billion, and the number is growing all the time. For this reason, this is a highly lucrative industry to invest in especially in the mobile payments processing arena.
Planet IntertwinglyThe maximalist approach to removing Trump
The list of ways Trump’s term might be cut short ranges from impeachment, to the invocation of the 25th Amendment, to personal blackmail, to a Fact Ex Machina that is so awful and indisputable that it picks him up by his ill-fitting suit and kicks him into the Loser’s Suite of his new DC hotel. But if this past year has taught us anything — and I’m open to the possibility that it has not — it’s that we are very bad at making predictions about specific events that result from complex circumstances. We can’t know if and how Trump’s term might come to early end. For all we know, he might exeunt chased by a bear. (Hint: The bear is Russia.) Which suggests that the most effective action ordinary janes and joes like us can take is to create the conditions under which several paths are easier to be trod. For example: Demonstrate the depth and breadth of the opposition by loyal, patriotic US citizens, to embolden Congress to oppose and remove him. Extend and deepen the bonds among his opponents — emotional as well as political bonds Expose as many of his lies as we can Call him on his bullshit and attacks on the Constitution Make heroes of his opponents, no matter what party they’re in Frame him as an outsider to the American tradition and to both political parties Do what we can as citizens, techies, parents, businesspeople, creators, activists, mimes — whatever is our excellence and our joy — to pursue a particular path towards Trump’s removal…and, not incidentally, to repair the damage his administration causes to our neighbors and communities. When the future is so unknowable, we have no choice but to make it more possible. The post The maximalist approach to removing Trump appeared first on Joho the Blog.
Planet IntertwinglyDigital Catapult pairs up with IBM Watson for...
Digital Catapult pairs up with IBM #Watson for #AI prizeDigital Catapult pairs up with IBM Watson for...IBM Technical Rock Star Program
Hacker NewsTotally in awe of this guy's mad skills (@bunniestudios)
Hacker NewsGrowSumo is hiring a Senior Front end Developer
Ars TechnicaVivaldi is building “Opera as it should’ve been”

Enlarge (credit: Vivaldi)

Working in tight niches occupied by the behemoths of the Internet world is hard; doing it as a startup without external funding is even harder. The 35-strong team of Vivaldi, the spiritual successor to Opera, is doing exactly that: two years after the first public beta and eight months after the release of version 1.0, the Web browser has about 1 million users—but it still isn't turning a profit.

Vivaldi, which was envisioned by the Opera Software co-founder and former CEO Jon Stephenson von Tetzchner, is catering first of all to power users and the tech-savvy lot. The team, however, has high expectations for their product and hopes it will have a broader appeal over time in order to start actually making money.

More is more

In case you haven't heard about Vivaldi before, it's a Chromium-based “non-conformist” desktop Web browser that goes in the opposite direction to the mainstream. While the major players like Chrome or Firefox are stripping the browser to its bare essentials, Vivaldi offers more and more integrated features and customisation options.

Read 26 remaining paragraphs | Comments

Hacker NewsA Visa for founders, engineers and investors willing to join France
Daring FireballApple in 2016: The Six Colors Report Card

Jason Snell:

As we close the door on 2016, I thought it would be useful to look back at the year gone by and ask a panel of my peers who pay attention to Apple and related markets to take a moment and reflect on Apple’s performance in the past year.

This survey is such a valuable service. The consensus scores feel like a very accurate assessment of Apple’s year.

roguelike developmentRandom Story Generation Part 1: Nothing More Practical Than A Good Theory
Random Story Generation Part 1: Nothing More Practical Than A Good Theory submitted by /u/Pyrrho12
[link] [comments]
Planet IntertwinglyNew (updated) IBM Redbooks available
Today I want to inform you about new (updated) IBM Redbooks, that might be of interest for z/VSE users.   Those IBM Redbooks are related to hardware: IBM z Systems Connectivity Handbook: It describes the connectivity options that are available for use within and beyond the data center for the IBM z Systems family of mainframes. IBM z13 and IBM z13s Technical Introduction: It introduces the latest IBM z Systems platforms, the IBM z13™ and IBM z13s. It includes information about the z Systems environment and how it can help integrate data, transactions, and insight for faster and more accurate business decisions. IBM DS8880 Product Guide (Release 8.2.1): It gives an overview of the features and functions that are offered by the IBM DS8880 models with Release 8.2.1. There are also new IBM Redbooks available on other IBM Storage, such as an Introduction to Storage Area Networks, Implementing the IBM Storwize V3700, Implementing the IBM Storwize V5000 Gen2 (including the Storwize V5010, V5020, and V5030), Introducing and Implementing IBM FlashSystem V9000. You can find those IBM Redbooks on the "Trending web page" - here.   We plan for a CICS TS for z/VSE Redbook. Is there any topic, that you would like to be addressed ? I am looking forward to your feedback. Thanks.  
Planet IntertwinglyStreaming suicide and other design decisions
“A 12-year-old girl live-streamed her suicide. It took two weeks for Facebook to take the video down.” So reads the headline of a January 15 news story in The Washington Post. Saying that she’d been sexually abused by a family member, 12-year-old Katelyn Nicole Davis, of Polk County, Georgia, hanged herself, broadcasting the suicide via a 40-minute live stream seen worldwide. While YouTube immediately removed the video, it “lingered on Facebook for nearly two weeks,” according to the Post’s reporting of Buzzfeed and other unspecified “media reports.” First, it just hurts I keep rereading the short article and its headline as if it will make sense or stop hurting on the next scan-through. As a human being, I can’t fully process the horror and sadness of this tragedy. I was initially going to write “as a human being and the father of a 12-year-old girl,” but that last part shouldn’t matter. You don’t need to be the parent of a child Katelyn’s age and sex to feel the feelings. Nor does there need to be someone in your life who was raped or molested—although, whether they’ve told you about it or not, there almost surely is. Statistically there are likely multiple someones in your life who have suffered unspeakably, too frequently at the hands of people whose main job in life was to protect them. I’m sorry to have to write these words, and I hope reading them doesn’t rip open wounds. But the point is, even if you and everyone you in your circle has lived a magical life untouched by too-common crimes and horrors, it is still unbearable to contemplate too closely what Katelyn must have felt, and what she did about it, and what watching what she did must have done to those who watched the video—both the empathetic majority, and the hopefully small minority of viewers who, because of their own damage, may have gotten off on it, edging just that much closer to some future sociopathic acting-out. A designer’s job On a personal level, I’m good citing horror and sadness as a reaction to this ugly story. But as a web and product designer, I can’t help but see it as another instance of what Eric Meyer and Sara Wachter-Boettcher warn about in their book, Design For Real Life. Namely: For every wonderfully fresh use of the internet’s social power we conceive, we must always ask ourselves, how might this be used to make our world more hurtful, less loving, less kind? What unforeseen dangers might our well intentioned innovation unleash? I published Design For Real Life, but I don’t cite Katelyn’s story or repeat Sara and Eric’s moral here to sell copies. I do it to remind us all that what we make matters. Our design decisions matter. The little qualms that might float through our minds while working on a project need to be examined, not suppressed in the interest of continued employment. And the diversity of our workforce matters, because it takes many different minds to foresee potential abuses of our products. Streaming suicide, monitoring content Live.me isn’t the first live streaming app, and, as a category, live streaming likely does more good than harm. The existence of a live streaming app didn’t drive a girl to kill herself, although, in despair at not being listened to, she might have found solace and an appeal in the idea that her suicide, witnessed globally, could lead to an investigation and eventual justice. Similarly, when Facebook began allowing its customers to perform live streaming (or, in Nicole’s case) to post video streams from third parties, use cases like pre-teen suicide or the torture of a mentally disabled teenager most likely did not factor into those business decisions. But here we are. And, as much content as Facebook produces in a day, you can’t really fault them for not always being johnny-on-the-spot when some of that content violates their guidelines. Invention is a mother There’s no closing Pandora’s box, nor would we wish to. But we who create websites and applications must remain mindful, honest, and vigilant. We must strive to work in diverse teams that are better than homogenous groups at glimpsing and preparing for the unforeseen. More than ever, we must develop design practices that anticipate the horrible and tragic—not to mention the illegal and authoritarian. And in life, as well as design, we must do a better job of asking ourselves what we are not seeing—what struggles the people we meet may be hiding from us, and how we can help them before it is too late. The post Streaming suicide and other design decisions appeared first on Zeldman on Web & Interaction Design.
Planet IntertwinglyHow to simulate the impact of a Compute Node failure on running VMs in PureApplication?
When designing and building patterns on PureApplication, most clients need to demonstrate the impact of hardware failure of a Compute Node on VMs running software. For example, what happens when the Compute Node hosting the primary DB2 VM fails? Deploying a pattern instance and pulling out a Compute Node from a PureApplication System in the data center is usually not an option (as suggested in this thread on the dw Answers forum). Instead you could try and simulate this by: Explicitly killing the process(es) on the VM. Issuing a "shutdown -h" from the shell within a VM. Issuing a "Power off" from the PureApplication UI for the VM. The issue with (1) is that this is very specific to the actual software. When performing (2), the OS actually performs a graceful shutdown (so again not realistic). Option (3) looks like the best option, however we found that the command to "Power off" a VM actually send a signal to the OS to perform a graceful shutdown as well. We will describe a mechanism here to perform a "realistic" and ungraceful "Power off" of the VM here. We can achieve this by making sure that this signal that is sent to the VM simply does not arrive or does not perform a graceful shutdown. Under the covers, VMWare Tools is installed on every VM in PureApplication (on Intel). VMWare Tools is running a set of services within the OS of the VM, which can be used to receive the call from VMWare to perform a graceful shutdown of the OS. In order to prevent this for testing purposes, we can simply stop the VMWare Tools services: Note:    Please keep in mind that performing this simulation of an ungraceful shutdown of a VM may lead to data corruption of the filesystem(s) within the VM! -bash-4.1# /etc/vmware-tools/services.sh stop Stopping VMware Tools services in the virtual machine: Guest operating system daemon: [ OK ] Unmounting HGFS shares: [ OK ] Guest filesystem driver: [ OK ] VM communication interface socket family: [ OK ] VM communication interface: [ OK ] With the VMWare Tools services have stopped, issuing a "Power off" from the PureApplication UI for the VM will effectively be a ungraceful shutdown. You can validate this by examining the file messages in /var/log after the "Power off", it should show a message that recovery is required on a readonly filesystem: Jan 5 08:11:29 pure-9-3-172-232 kernel: dracut: Scanning devices sda2 for LVM logical volumes vg_root/LogVol00 vg_root/LogVol01 Jan 5 08:11:29 pure-9-3-172-232 kernel: dracut: inactive '/dev/vg_root/LogVol01' [2.00 GiB] inherit Jan 5 08:11:29 pure-9-3-172-232 kernel: dracut: inactive '/dev/vg_root/LogVol00' [9.75 GiB] inherit Jan 5 08:11:29 pure-9-3-172-232 kernel: EXT4-fs (dm-1): INFO: recovery required on readonly filesystem Jan 5 08:11:29 pure-9-3-172-232 kernel: EXT4-fs (dm-1): write access will be enabled during recovery Jan 5 08:11:29 pure-9-3-172-232 kernel: EXT4-fs (dm-1): recovery complete Jan 5 08:11:29 pure-9-3-172-232 kernel: EXT4-fs (dm-1): mounted filesystem with ordered data mode. Opts: Jan 5 08:11:29 pure-9-3-172-232 kernel: dracut: Mounted root filesystem /dev/mapper/vg_root-LogVol00 Another approach here would be to simply uninstall the plugin from VMWare Tools that facilitates the call from VMWare to the OS for a graceful shutdown. The name of this module is vmware-tools-plugins-powerOps, and you can simply uninstall it using the following command: yum uninstall vmware-tools-plugins-powerOps The advantage of this approach is that you will have the remaining VMWare Tools modules still in place, which in general optimise performance of the OS running inside the VM. Should you wish to re-install the module vmware-tools-plugin-powerOps, you can simply download it from here. Note that you must ensure to download the correct version, i.e. it should match the OS and VMWare ESXi version used. For PureApplication System 2.2.2, ESXi 6.0.0 is installed and you can find the vmware-tools-plugin-powerOps for RHEL6 here. Older versions of PureApplication System use ESX 5.1.0 update 3, you can find the vmware-tools-plugin-powerOps for RHEL6 here. Note: You can determine the version of ESX by performing a REST GET call to https://
Planet IntertwinglyBuild a serverless Slack app and bot with IBM...
Build a #serverless Slack app and bot with IBM Bluemix #OpenWhisk and API ConnectBuild a serverless Slack app and bot with IBM...IBM Technical Rock Star Program
Hacker NewsBattery with inbuilt 'fire extinguisher' developed
Planet IntertwinglyDevOps Workshops – I Cannot have Enough!
“Just when I thought   I knew your ways   That's when you come to make me see   That all I knew   Was only just a glimpse of you  I cannot have enough” – by The Dynamites   I went to InterConnect, IBM’s annual conference on Cloud computing, for the first time in 2015. Amidst the numerous sessions and activities at the conference, I had a chance to attend one of the DevOps workshops. And I was completely mesmerized.   I joined the DevOps team just a few months before the conference and I had researched and discussed the topic in great detail, so I felt like I had a pretty good handle on the topic.  But it was not until I sat through the workshop and listened to clients discuss how they used DevOps methods to streamline product definition and delivery and to bring new solutions to market faster, that the key concepts crystallized practical understanding of DevOps. At InterConnect 2016, my first thought was, “Well, how different could this year’s workshops be…maybe this year I should spend my time on something else?” But when I saw the new workshop topics there was so much more to explore. The Garage Method and the Design Thinking topics looked especially inviting as these were cool concepts, new on the block and I knew I would not want to miss these.   What makes DevOps workshops special??  DevOps workshops are not like the regular breakout session at InterConnect. They are interactive, small-group workshops, led by IBM DevOps experts – literally some of our best – who oversee the discussion and provide inputs to further the attendees’ understanding with structured exercises and sharing ideas and experiences. Some of the things that stood out for me were:  Ease of understanding – use of simple language for even a layman to understand the concepts  Interactive format – a group of people seated around small round tables discussing their challenges and learning from each other’s experiences or getting their queries resolved by the facilitator who share IBM DevOps experts, Distinguished Eng gineers, executives, and z consultants.   No presentation – with the facilitator and the attendees making use of the whiteboard, flip charts and sticky notes, there was spontaneity and no monotony.  High energy levels – all the interaction, the problem solving, the discussions ensured high energy levels throughout the workshops    The 90 mins of flew away in the blink of an eye leaving me wanting more.     My plan for InterConnect 2017  This year I am directly involved with the DevOps workshops planning and execution so I’ll be at every one of them and I hope you are too!  With a line-up of new topics, which include: Agile Banking Digital Transformation Value Stream Mapping Design Thinking Continuous Delivery of Software Innovation in the Multi-Speed IT World Bluemix Continuous Delivery and Garage Method Mainframe DevOps Application Performance Monitoring and DevOps Hybrid Cloud Management Scaled Agile Framework   Please be prepared for a full house, as there is limited seating.  If, like me, you do not want to miss this opportunity, I recommend you register yourself for IBM InterConnect at: http://bit.ly/interconnect_2017  and then add the workshops to your InterConnect 2017 agenda.    To reiterate the verse at the beginning of the post, after attending, you may find that you cannot get enough either!    You can follow my twitter handle @dishagmittal or @ibmdevops to get latest updates on what’s new for DevOps at InterConnect 2017.         Disha Garg Mittal Content Strategist, IBM Cloud Marketing - DevOps  
Ars TechnicaJapan just tried to launch the world’s smallest orbital rocket


This weekend Japan tried to launch a 3kg cubesat into orbit aboard its multi-stage, SS-520 rocket. Were it to have succeeded, the SS-520 would have become the smallest rocket to ever deliver a payload into orbit. Alas, the rocket did not make it.

According to the Japanese Exploration Agency, or JAXA, the sounding rocket launched on Sunday morning from the Uchinoura Space Center on the country's southernmost main island, Kyushu. Although the first stage fired normally, a preplanned check between first-stage separation and the ignition of the second ignition did not show consistent telemetry data. This prevented the firing of the second stage, and the rocket fell into the Pacific Ocean, southeast of the spaceport.

Read 3 remaining paragraphs | Comments