Monday, November 24, 2008
The Tree of Life and Love
I am a part of Everest’s steps,
The blizzard forming more of me.
A chunk of me could drown Earth’s steps,
Soon, I will rule and walk round free.
I stand erect on Flanders Field.
The peaceful wind erode my cross,
A memorable slab on Flanders Field,
So stuck, so clean, but what a loss.
I sit as sediments on a land,
The grass protruding through my skin,
And mammals kicking me through land,
Do not they think that it is sin?
I cover grounds across terrains,
I build on top of self with self,
‘Til break, I fall to all terrains,
Then light to shatter grounded shelf.
I stood on top of Everest’s steps,
The blizzard blowing on my head,
Was brought about by snowman’s steps.
He saw me dying on my bed.
I stood beside my Flanders Field,
My crested reds encircled grass.
The tears of misery splashed my field,
Artillery locking on my mass.
I knelt before the knees of lions;
They hid behind my safety blades.
They leapt; the ox was caught by lions.
No pity; nature, lost in raid.
I saw barbarous sky diffused.
Against my twigs, through networked roots,
My birds confused, my squirrels diffused,
The special spot became black soot.
I stood on top of Everest’s steps,
The blizzard howling through my ears,
Was brought about by Heaven’s wish,
Turned back, stared, caught by brownish claws.
I stood on top of Flanders Field,
My knees collapsed and eyes o’erfilled.
Remembrance! Please respect the Field
For spirits—corpses dead: o’erkilled.
I trotted through some golden swords,
Was fooled by ears that told me silence,
Was ambushed, killed with natural swords.
As ignorant ghost, I swore for vengeance.
I sensed the sky’s immediate lapse,
Which shocked my soul of song and fear.
I had no choice but jump and lapse,
So close I thought that death was near.
I stood above Mount Everest’s steps,
Forever smiling down at them.
A storm, big fall, mistaken step,
For me to dictate life and men.
I napped below the crusted knees,
My spooky shade destroyed my strife.
Now I can get up from my knees,
And not regret a wasted life.
I stood beside my son’s good soul,
Protecting him from any harm.
But witnessed death of second soul,
His lack of feelings lost his charm.
I saw the course of dying tree,
I granted it a mercy death,
But things went wrong around the tree.
I closed my eyes and sighed a breath.
I feed on nothing.
I live on nothing.
I love nothing.
I hate nothing.
I am not dead.
I am around.
I am all Is.
I am nature.
I am peace.
I am war.
I give everything.
Nothing gives me back.
I am all.
All am I.
On me, there exists The Stumped Arc,
That of the tree, the man, and God.
The Nature of Euthanasia
Atop the brown elixir once of life,
Now smelt of sea gull’s recourse–filthy feast,
Lies Lily who protrudes like dullest knife,
In need of one to grant her life deceased.
Our Mother hugging on its rotten roots,
Our water holding life for hanging stems,
Our light rays breeding blighted, yellow shoots,
Become the torturous acts that one condemns.
To nature: halt! Let one consume her time.
For if she lingers on thy weary gift,
Her static home will offset with its grime.
Oh end it clean! Oh end it quick and swift!
So let her breathe and jest a final breath,
And stop her suffering with a mercy death.
Blank Passwords
The following is something I discovered while at PlateSpin. It is really an awesome company =) The message has been modified to censor out any PlateSpin-relevant content.
In Windows XP, 2003, and higher, you can change your password to a blank password easily. However, this can ironically increase security for your computer! By default, you cannot remotely access your computer over the network or the Internet if your password is blank! Hence, hackers would not be able to use this method of remotely connecting to your computer to hack it. Hence, setting a blank password is good if the computer is physically secure, and you only have 1 computer or computers that do not to access other computers.
However, if you are desperate to allow remote access on a computer with a blank password, you can allow it… Open gpedit.msc and go to Computer Configuration -> Windows Settings -> Security Settings -> Local Policies -> Security Options. Then disable Accounts -> “Limit local account use of blank passwords to console login only”. After that, you can remotely access the computer.
Note: These settings are not available in Windows 2000, ME, and earlier.
In Linux, login to root and go to “/etc/shadow” and look for your username. Let’s say you have “root:$1$aA9RiNmC$0NlogMx3oslqiHtPuPnqL.:14203:0::7:::”. Remove the second field so that it becomes “root::14203:0::7:::”. Now, you have a blank password (you do not have to go through all the steps above to allow remote access for blank passwords though)! Unfortunately, you are not able to merely change the password by simply using “passwd”, since the validation does not allow blank passwords. There are discussions in which you can find the encryption it uses in order to encrypt NULL, which, theoretically, leads to a blank password as well. These machines could be discovered without a problem.
Furthermore, interestingly enough, by default, ESXi servers have a blank root password!
Sunday, November 16, 2008
What I have been doing
I realize my first-person shooter skills on PC have failed me really badly. I am now always last in online matches... This is a skill I need to achieve back; losing a skill is never good. Every week, my cousin comes over to play video games with me. It is a useful experience, because most games involve eye and hand coordination, but most importantly, the reaction time or the "clock that ticks inside me".
I am also reading Go books. Again, this is something I have abandoned and was thrown into the dump, so I have to dig it back out. Now, I shall see how far I can go into books before making a surprise attack into the world of Go... I hope.
And of course, there is a infinitely-long list of what I intend to do in the future...
Random quote from my co-workers:
A: So you are worth 60 billion yesterday and then you are worth 30 billion today. How would you feel?
B: I would feel happy. Come on, half of infinity is infinity!
Monday, November 3, 2008
Greeks Remark
As quoted in the remarks of the MFE exam:
Greeks
Greeks are partial derivatives of the option price formula. “The actual formulas
for the Greeks appear in Appendix 12.B” (McDonald 2006, p. 382). As the author
seemed to want to avoid using calculus in the first half of his book, the definitions given
on pages 382 and 383 are numerical approximations. We need to be careful about the
units in which changes are measured. For example, it is stated on page 383 that “[t]heta
(θ) measures the change in the option price when there is a decrease in the time to
maturity of 1 day.” However, the mathematical definition for theta is the partial
derivative of the option price with respect to t. In the Black-Scholes option-pricing
formula, the variable t is (usually) in years. Thus, the definition on page 383 differs from
the partial-derivative definition by a factor of 365.
lol.
Wednesday, October 29, 2008
Rachmaninoff's Piano Concerto No.2 Mvt. 1
MFE Exam
I am quite satisfied that I am able to understand chapter 20 and chapter 24 though! Although mathematically challenging, it had been fun to decipher the concepts behind them, particularly, Ito's Lemma and Brownian Motion.
However, I am scared at the extensive coverage of the material. They even had a question that involved an equation I did not expect to memorize... that is, the Vasicek Model formula. In addition to that, I assume that I would need to also memorize the Cox-Ingersoll-Ross Model formula. But at least the Black-Derman-Toy Model is more friendly...
After I broke the machine...
I decided to redo the conversion with the same source and target. Results? I broke it again, bweeeee ^_^
... anyways, to have this occur 2/2 really tells something about the cause and effect of the conversion. People are now getting excited as to what happened during the conversion. They continuously claim that the software component in no way interferes with the BIOS and stuff, but something weird is definitely going on here. One of my co-workers told me how once, a bug appeared only on the hour. The developers constantly closed it as "unreproducible" and no one knew what was going on. When the hour is hit, some event log thing crashed and it took them almost forever to realize the reproduction steps!
Anyhow, I decided to switch sources and do a conversion with a SLES9 SP4. If this failed, it would be quite a story. Luckily (or unfortunately), the conversion completed successfully. Tomorrow, I am going to try a conversion with SLES10 SP0 to determine whether this is only a SLES10 problem. Nonetheless, this issue is quite high in the priority, so hopefully I can get it done soon.
Tuesday, October 28, 2008
Today, I broke a server!
So previously, there was a bug in which if there was a physical harddrive that has over 1TB of HD space, then all Linux server migrations (which we call conversions) would fail because of an integer overflow during the discovery of the target's specifications (it was funny to see that my hard drives were detected to have -652.2 GB of HD space). Hence, no one had ever performed such Linux conversions. The bug was fixed recently, so initially, I was planning to do a SuSE Linux Enterprise Server (SLES) 8 64-bit conversion to it (was thinking of using GA or SP4), but we only supported AMD64 targets. Since Intel is non-Athlon, there is no support... although it is ridiculous that we support the Intel architecture for newer SLESes.
I decided to just try a SLES10 SP2 conversion to see if it works (also decided to charter this as part of my Linux 64-bit testing). Both the SLES10 SP2 and SLES8 were located Unfortunately, halfway through the conversion, while restarting the machine, the boot failed. I restarted the computer, but I was not able to get into BIOS, PXE boot, utility mode, nor configuration setup. I could only get into the BIOS / configuration utilities of the SCSI controller and the network card. After discovering the hard drives, the white cursor would blink indefinitely, waiting for a ghastly hand to press the button to give birth, only to die again.
Firstly, though unlikely, one of my thoughts was that the conversion software messed around with some of the BIOS or low level settings, but I was told that the conversion is software-sided, so it should not affect them. One of my co-workers told me that it was merely an unfortunate event of the computer dying at the wrong time.
Sunday, October 26, 2008
The Da Vinci Code
Furthermore, the book depicted a mathematician as a person who gets really really REALLY excited about phi.................................... Is that how literature authors think about mathematicians: socially enthusiastic about the subject, laughs at math jokes even I don't get..., make a fool of themselves?
Dan Brown noted in an interview that 99% of the facts in the story were historically accurate, but yet, the majority of historians have agreed that Priory of Sion was merely a prank made up by some random person who thought this would be interesting (Dan Brown noted in the first page that the Priory of Sion indeed existed). However, seeing how the book implicated the power of the Church, I think he ultimately wanted to implicate that the Church influenced most the historians, courts (the random person confessed in court that it was all a prank), and significant figures to release false information about the existance of the Priory of Sion. However, to distinguish my line between conspiracy theorists, I retain my doubts but also am cautious about the mainstream opinion. In short, I am indifferent about the truth, since it does not affect me at all!
From the above criticism, it appears that I depise the book, but this was not the case! It was really entertaining to read (the reader must take into consideration that I have not had much experience with mystery books)!
The book took a rather unexpected twist (I was expecting a twist, but later on, I thought that the twist did not exist, so I no longer expected the twist...) near the end and I was shocked at the moment the author wanted me to be shocked at, quite effectively, too! The storyline fitted in so perfectly that it was very scary.
Another ingenious element was the double entendres. Seriously, they were so incredible that I applauded every time the "2nd meaning" unveiled. Although I must say, the final double entendre was the best one of all =) The last few chapters were extremely climatic and it did not slow down even to the end.
Surprisingly, I must say that the main characters did not have much character development, but the side characters had an unbalancing amount development. The historian had the moral dilemma between truth and humanity, and the cryptologist appeared to have degraded as time went on despite this book celebrating feminity. In addition, the amount of masculinity was rather shocking; I expected more from one of the central themes that the characters revolved around. Meanwhile, the albino monk, the bishop, and the chief officer fell from the heights of power to regret.
I give this 8.2 stars out of 10!
Rashomon (1950)
Again, the theme is self-preservation even after death and reading up the history of the movie, it appears that Westerners "thought" that this was a good representation of the Japanese movie theatre, so they endorsed it. It was very well-received by Westerners, but not by the Japanese, who heavily crticized it for a lack of the environment that Japanese movies have and for the shocking theme of self-preservation. Despite the Japanese government suggesting an alternative representative to the Westerners, their efforts were futile, but I am unsure of the aftereffects of the movie's success to the Japanese.
The movie caused something known as the Rashomon effect: retelling of a story from different perspectives that offer a different twist every time. It influenced the production of many movies, including the recent Vantage Point (which ironically influenced me to watch Rashomon).