Narcissist of the Week?

Apparently Twitter has been a-tweet over David Ramsey’s list of “20 Things the Rich Do Every Day”. Ben Irwin has posted a pointed ripose, but the original post is a hoot.

The controversial list isn’t all that bad. There are a handful of good points (”81% of wealthy maintain a to-do list vs. 19% of poor”) surrounded by a sea of ignorance. He seems to think that if only the poor had more time, and above all money, then they wouldn’t be so poor. E.g. “76% of wealthy exercise aerobically four days a week. 23% of poor do this”.

No, don’t read it for the list. Read it for the amazing screed that he’s added to “defend” himself from all the criticism. Here are some choice nuggets:

“I am amazed at how many of my brothers and sisters in Christ have attacked us because of a simple list posted on our website.”

A “simple list”.

“When you actually bother to look into what we teach, you find generosity and grace taught throughout.”

Saying it doesn’t make it so.

“There is a direct correlation between your habits, choices and character in Christ and your propensity to build wealth [...]. To dispute that or attribute hate to that statement is immature and ignorant.”

He’s clearly been listening to his critics.

“My wife and I started our lives with almost nothing [...] driving two cars [...]“

You couldn’t make this stuff up.

“God has blessed our efforts and we have done well, and for that I am incredibly grateful and humbled.”

The idea that this man thinks he is “humble” is preposterous. I hereby award him my “narcissist of the week” prize.

I’ve never heard of David Ramsey before today, because I don’t watch TV so I’ve had no chance to watch his TV show, and I certainly don’t read self-help books, his or anyone else’s. I’m confused though: Since “67% of wealthy watch one hour or less of TV every day vs. 23% of poor”, but “86% of wealthy love to read vs. 26% of poor” – does that mean that poor people watch his TV shows, but then switch to reading his books once they’ve achieved wealth?… But, why would they be reading his books if they’re already rich?… Perhaps the books are about how to keep hold of your money, rather than actually making it?

Maybe I’m over-analysing.

Comments

File deduplication.

I use rsync for backups, and it has a very nice feature, where it uses hard-links to a reference directory tree, in order to reduce space. That works well, but sometimes the chain of links is broken, and disk space gets used up unnecessarily. The most common cause is when I move a file – rsync can’t tell that it’s moved, so the new location gets its own copy. That can be expensive if I’m renaming a load of videos!

So, it would be nice to find a tools that can spot these cases, and replace the duplicate files with hard links. There are a load of candidates, but none of them seem to quite meet my requirements.

Here’s what I need:

  1. Files must match metadata as well as content. Hard links merge the metadata, so if two files have different owners, then I can’t replace one of them with a hard link. I’m willing to accept some variations in meta data – access time, certainly. Probably modification time, and maybe even group. The ideal tool would let me choose what metadata is important to me.

  2. I probably want to set a minimum file size. The benefits of reducing duplication are pretty minimal when file sizes are small.

  3. I need to be able to blacklist/whitelist files by name, or by location. If a file is ever modified, then all of its link-brothers will also get modified. That’s no so bad for back-ups, which are hopefully immutable. But if I ever use this tool on files in use, it could be catastrophic.

  4. I’d like to restrict hardlinking to between directory trees, rather than just will-nilly within a tree. That would preserve the integrity of each back-up snapshot, just like rsync does.

  5. The number of hard links per inode is limited on some filesystems (particularly ext4 – which is what I’m using). The tool must know about this limit.

Frankly, i haven’t found anything that fits the bill, so I’m thinking of writing something myself. Here are the candidates…

  1. freedup Overall, the description makes it sound like a solid tool, and the documentation seems relatively complete. However, when I built it, I noticed that the Makefile attempts to write new lines into /etc/services, and yes, the program does contains socket/server code – which is apparently triggered by undocumented options. Personally, I’m a bit leery of file-system level tools that contain undocumented server code, so I’ll not be using it.
  2. fdupes This is a popular tool (packaged in Debian), but I don’t think it covers any of my metadata requirements.
  3. rmlink This is a fairly new tool – it’s not packaged, so i had to get it from github. It’s got good name filtering, but it doesn’t check metadata, allow for size or directory tree limits. Finally, it doesn’t natively support hard linking – you can give it a custom command to use, but that could not easily be taught about hard link limits. On the plus side, rmlink is reportedly very fast. Finally, the name is horrendously dangerous. I caught myself editing “rm” commands, because I’d not been paying attention when I did a reverse history search… Had I not noticed, and hit return, I might well have found myself needing those backups.
  4. fslint This is a GUI tool. Not much use on my server.
  5. hardlink is a pythobn script. I’ve not investigated it too much since there’s no online documentation.
  6. rdfind is a very basic tool. It doesn’t have any of the features I’m looking for.
  7. duff seems like a solid tool. It can’t make hard links, only report duplicates. It does permit me to set a minimum file size. No coverage for any of my other requirements.

The fdupes Wikipedia page contains a useful list of other such tools. I may investigate more of them later.

Comments

EPS, XPS or PIR for EWI?

I’m having second thoughts about using Polyisocyanurate (PIR) boards for our external wall insulation (EWI). PIR is the best commonly available insulator, so it will enable us to get the most insulation into the limited thickness that we have available. Unfortunately, I’ve just learned that PIR has some problems that may cause it to deteriorate with age. Firstly, it is liable to shrinkage, which means that gaps might open up between the boards. Not only would that compromise thre insulation, but it might show through the render, and spoil the external appearance of our house. Worse, PIR can deteriorate if it gets damp, which is something that is hard to rule out. Finally, the gasses trapped in the foam could leak out over time, further degrading the material’s performance. Is that bound to happen? No. But it’s certainly got me considering alternatives… Read the rest of this entry »

Comments

fostertom on EWI

Excellent advice from fostertom on external wall insulation (EWI):

The ideal is EWI to walls, continuous with similar EPS [expanded polystyrene] on OSB [a kind of plywood] boarded over the top of the rafters, tiles/slates replaced but a bit higher up. The roof OSB is adequately airtight, without any problems with interruption by internal trusses etc. Unfortunately EWI can’t be relied on to be airtight, so either an external rough-render (breatheable) on the brickwork before EWI-ing, or the internal plaster wd be your wall airtight barrier.That (like IWI [internal wall insulation]) is problematic because of joist penetrations and joists so close parallel to wall that you can’t make the internal plaster continuous through the floor thickness. Also needs connecting up with roof OSB (or with over-joist membrane if trying to air-tight at loft floor level).

(from greenbuildingforum.co.uk)

Comments (2)

ICICI bank

Me (calling ICICI bank): Hello, I’m trying to open a savings account, but when I click next on your form, it says “Address information cannot have special characters” – but I can’t see any special characters in any of the fields I’ve entered.

ICICI bank: Hello sir. I’m very sorry for the inconvenience. What browser are you using?

Me: Erm let me see. It’s Firefox 21.0.

ICICI: I’m sorry sir, you are using Safari. Please try to use Internet Explorer.

Me: I’m not using Safari. I’m using Firefox, version 21.0.

ICICI: Please try to use Internet Explorer.

Me: I don’t have Internet Explorer.

ICICI: You don’t have Internet Explorer???

Me: I think I’ll find someone else to look after my money, thanks.


Microsoft has been selling Windows without Internet Explorer for years! Even if they assumed I was using Windows, it’s by no means safe to assume that everyone will have IE. I should have told him I was using my phone – that would have freaked him out even more!

Comments

Ultimate Tic-Tac-Toe

This. I like this: http://mathwithbaddrawings.com/2013/06/16/ultimate-tic-tac-toe/

It’s a variant of boring old tic-tac-toe that is actually interesting. I want to give it a go.

Comments

The Washington Post’s NSA survey is biassed

The Washington Post recently published the results of a survey that purports to show that:

the public backs giving the federal government broad authority to investigate terrorist threats, even extending to the NSA program that monitors phone records

Their first question shows a 2:1 split in favour of the authoritarian position:

What do you think is more important right now for the federal government: to investigate possible terrorist threats, even if that intrudes on personal privacy OR not to intrude on personal privacy, even if that limits its ability to investigate possible terrorist threats?

a. Don’t invade privacy (34%) OR
b. Investigate threats (62%)

Those were terrible yes/no options that absolutely do not allow people to express a nuanced view. This is not an either/or issue. A moderate would say that authorities should usually respect privacy, but they should also investigate serious threats.

The wording of the options guides moderate respondents towards the authoritarian position. Option a. “don’t invade privacy” is an extreme, equivalent to “never invade privacy”. But option b. “investigate threats” allows for the moderate position “investigate only serious threats”. A moderate respondent will want a little of both, so they can only choose b.

Let’s rephrase the options to be biassed in the other direction, so that moderates must favour a.:

a. Respect privacy OR
b. Treat everyone as a potential threat

Finally, here’s a balanced version, where a moderate can safely choose either answer:

a. Respect privacy OR
b. Investigate threats

Comments

Electric kettle vs. induction hob

I have a 3kW electric kettle, and a 2kW induction hob, and I find the induction hob faster and more convenient. (My wall sockets are all 240V.)

However, I’ve just actually measured it, and the situation is more complex… I timed how long it took each of them to boil a single cupful of water. Unsurprisingly the 3kW electric kettle boils the water much more quickly, but it takes ages for its temperature sensor to notice. The electric kettle turned off at almost exactly the same time as the stove-top kettle started to whistle.

So for small volumes of water, it’s a draw. For larger volumes of water, the electric kettle is noticeably quicker.

Why then, do I find the stove-top kettle much more convenient? I think it’s because it has a better “user interface”. When the electric kettle has boiled, it clicks off and I often finish whatever else I’m doing before going to use the hot water. By then, it’s usually cooled down a bit, and I have to turn it back on and wait to bring the water back to the boil. (Actual boiling water is very important for making tea.) OTOH, the stove-top kettle whistles and stays boiling, so I am forced to go and deal with it immediately. The result is that I get my tea made a little bit quicker, with less waiting around.

Interesting. Perhaps electric kettles should replicate that UI, by having a continuous alarm, instead of automatically turning off.

Comments

IPv6

I’m dipping my toe into the world of IPv6. My home network now supports it (Thanks to AAISP), and now I’ve started to slowly shift my server addresses over. Inspiration from ipv6friday.

Comments

Configuring a Gigaset IP phone with a Technicolor router.

I’ve switched away from BT to using a VoIP number provided by my ISP. AAISP strongly encourage their customers to avoid NAT for VoIP, but I wanted to give it a try anyway. Here’s how I got it working.

Update 2013/4/10: Although this NAT set-up does work, it only seems to work for a day or two. After a while, the audio connection stops working, so the phone will ring, but there is no audio in or out or both. After playing around with it a bit, I abandoned NAT, and gave my base station a real IP address. So, you can follow these instructions, but you will probably have the same problems… Read the rest of this entry »

Comments (1)

Sponsors