Capo is one of those remarkably useful apps that I cannot live without.
I am often asked to play covers or to tackle more challenging tunes like Buble’s I’ll Be Home For Christmas (pictured above). Capo is a reverse engineering tool for the musician. I use it extensively to learn guitar parts.
Capo can slow down a song and maintain pitch. This really helps me to learn the parts by ear — go slow to go fast.
Can’t say enough good things about Capo. If you are a player then give Capo a try.
Time to rebuild the large pedalboard. I needed to raid some pedals off one of my other pedalboards.
Although the time to rebuild this larger pedalboard took almost 6 hours to complete. Aside from getting the pedals into an optimum position, which seemed more like a twisted game of Tetris, I changed my mind a few times on whether to use a bypass looper or not — the bypass looper is the long silver pedal at the bottom right of the pedalboard. And would I use a 7 or 10 switch bypass looper. I wound up using the 10 switch bypass looper.
I use soldered cables for my pedalboards as I do not trust the solderless ones. Solderless cables have failed me too many times. Soldered cables? Not yet. With the big pedalboard, I have 23 cables connecting to the looper as well as a few other inline cables. I had to do a fair bit of soldering when rebuilding this pedalboard.
I finished it all up this morning just in time for practice this evening. I’ll be taking it out on the weekend and hopefully everything works without any issues.
The order of this pedalboard (ignore the switch labels on the looper in the photo above, I had to change them given the rebuild of this pedalboard):
Guitar -> EP Booster -> Keeley Compressor -> Looper Input -> Pog -> Fulltone Wah -> Timmy Overdrive -> Alpha Dog Distortion -> Big Muff Distortion/Sustain -> Volume -> Mobius Modulated Effects -> El Capistan Delay -> Timeline Delay -> Wet Reverb -> Looper Output -> Deco Tape Saturation -> Amp
The looper has a dedicated switch for mute and tuning. And I have a Strymon preset control switch on the lower left side of the pedalboard.
Which size do I prefer? The smaller the better. However, for some of the dates I play, bigger is required. Lots of tone tools on the bigger board. I like being able to kick in either the Alpha Dog or the Big Muff when an opportunity to solo comes along.
So heavy that big monster. So very heavy.
Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials.
By coincidence, I happened to be on the Office of the Privacy Commissioner of Canada’s website reading about how to protect my privacy online.
Seems like that is a lost cause.
The U.S. government is reading everything. Wikipedia has a recent list of all of their mass surveillance programs:
- Boundless Informant: A system deployed by the National Security Agency to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from Iran, 6.3 billion from India, and 2.8 billion from the United States.
- BULLRUN: a highly classified U.S. National Security Agency program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).
- Carnivore: A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications. Apparently replaced by commercial software such as NarusInsight.
- Comprehensive National Cybersecurity Initiative
- DCSNet: The Federal Bureau of Investigation (FBI)’s point-and-click surveillance system that can perform instant wiretaps on any telecommunications device located in the United States.
- Fairview: A mass surveillance program directed at foreign mobile phone users.
- Financial Crimes Enforcement Network: A bureau of the Department of the Treasury that collects and analyzes financial transactions in order to combat financial crimes.
- ICREACH: Surveillance frontend GUI that is shared with 23 government agencies, including the CIA, DEA, and FBI, to search illegally collected personal records.
- Magic Lantern: A keystroke logging software deployed by the FBI in the form of an e-mail attachment. When activated, it acts as a trojan horse and allows the FBI to decrypt user communications.
- Main Core: A personal and financial database storing information of millions of U.S. citizens believed to be threats to national security. The data mostly comes from the NSA, FBI, CIA, as well as other government sources.
- MAINWAY: NSA database containing metadata for hundreds of billions of telephone calls made through the four largest telephone carriers in the United States.
- MUSCULAR: Overseas wiretapping of Google’s and Yahoo’s unencrypted internal networks by the NSA.
- MYSTIC is a voice interception program used by the National Security Agency.
- Nationwide Suspicious Activity Reporting Initiative: Under this government initiative, a Suspicious Activity Report (SAR) may be filed by law enforcers, public safety personnel, owners of critical infrastructure or the general public.
- NSA ANT catalog: a 50-page document listing technology available to the United States National Security Agency (NSA) ANT division to aid in cyber-surveillance.
- PRISM: A clandestine national security electronic surveillance program operated by the United States National Security Agency (NSA) which can target customers of participating corporations outside or inside the United States.
- Room 641A: A telecommunication interception facility operated by AT&T for the U.S. National Security Agency.
- Sentry Eagle: efforts to monitor and attack an adversary’s cyberspace through capabilities include SIGINT, Computer Network Exploitation (CNE), Information Assurance, Computer Network Defense (CND), Network Warfare, and Computer Network Attack (CNA). The efforts included weakening US commercial encryption systems.
- Special Collection Service (SCS): A black budget program that is responsible for “close surveillance, burglary, wiretapping, breaking and entering.” It employs covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.
- Stellar Wind (code name): The open secret code name for four surveillance programs.
- Tailored Access Operations: Intelligence-gathering unit of the NSA that is capable of harvesting approximately 2 petabytes of data per hour.
- Terrorist Finance Tracking Program: A joint initiative run by the CIA and the Department of the Treasury to access the SWIFT (Society for Worldwide Interbank Financial Telecommunication) transaction database as part of the Bush administration’s “Global War on Terrorism”. According to the U.S. government, its efforts to counter terrorist activities were compromised after the existence of the Terrorist Finance Tracking Program was leaked to the media.
- Turbulance (NSA): Turbulence is a United States National Security Agency (NSA) information-technology project started circa 2005. It was developed in small, inexpensive “test” pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers. The U.S. Congress criticized the project in 2007 for having similar bureaucratic problems as the Trailblazer Project.
- US Intelligence Community (IC): A cooperative federation of 16 government agencies working together, but also separately, to gather intelligence and conduct espionage.
- Utah Data Center: The Intelligence Community’s US$1.5 billion data storage center that is designed to store extremely large amounts of data, on the scale of yottabytes.
- X-Keyscore: A system used by the United States National Security Agency for searching and analysing internet data about foreign nationals.
Canada also spies on its citizens with a massive secret surveillance program.
Sehr geehrter Herr Cleaver,
wie zahlreiche Organisationen muss auch das Forschungsinstitut Fraunhofer IVI eine große Menge unstrukturierter Daten bewältigen. Diese Herausforderung löste Fujitsu passgenau mit einer ganzheitlichen und performanten Storage-Infrastruktur. Wie diese aussieht und wie das Fraunhofer IVI davon profitiert, lesen Sie im heutigen Newsletter.
Zudem präsentieren wir Ihnen ein neues, informatives Video zu ETERNUS CD10000, eine Sparpreis-Aktion für Storage Appliances der ETERNUS CS-Reihe und ein aktuelles Webinar zum Thema Software Defined Datacenter.
Und schließlich erhalten Sie Informationen zu den Fujitsu Storage Days 2017, die Sie auf keinen Fall verpassen sollten.
Sie sehen: Die Lektüre dieses Newsletters lohnt sich für Sie in mehrfacher Hinsicht. Viel Spaß dabei!
Filed under #howdidtheygettome #noescape
First it was the Samsung Galaxy Note 7 catching fire.
Then it was Samsung washing machines exploding.
Looks like Samsung tablets can also generate a bit of heat.
Some of my friends asked me for my thoughts about the issues at Samsung.
I think a few Samsung executives should be fired.
To capitalize on the new design feature, I think Samsung should rename the Galaxy Note 7 to the Galaxy Supernova.
I do agree that the sales of Samsung devices have ignited over the past few months.
I think Samsung should take over the manufacturing of the Kindle Fire for Amazon.
And, finally, I think that Samsung’s warranty statement should be revised to the following:
The warranty on your Samsung product does not cover the following: Accidents, fire, Acts of God, fire, lightning, fire, water, fire, public disturbances, fire, improper ventilation, fire, voltage fluctuations, fire or any cause beyond the control of Samsung such as fire.
I’m here all week.
Back in April last year, I was complaining about a stunning guitar that I have as part of my collection: a Collings CL Deluxe.
I hardly ever play it. Why? Because the instrument is simply too polite. I’m not sure what else to say about it. Flawlessly hand built, it is one of the most wonderfully crafted instruments I have ever played.
But the tone? Only so so.
My 76 Les Paul has more character than the Collings CL Deluxe.
Last year I thought about dropping in a different set of humbuckers. I did not get around to doing so for a variety of reasons. And I thought about selling the instrument. On the used market, these guitars are selling well over the $5,000 mark. Clearly collectible. Perhaps worth holding on to this particular guitar more as an investment.
That said, I am now debating pulling out the Lollar Imperials and dropping in a set of ThroBak Pro-90s.
The pickups are described this way:
The ThroBak PRO-90, humbucker sized P90, duplicates the construction, materials, and growl of a vintage P90 pickup by using ThroBak’s proprietary Vintage Core™ specifications. The ThroBak PRO-90 brings a new level of authentic tone and feel to players seeking 50’s P-90 growl making these the best humbucker sized P90 in their class. 100% USA made.
I’m still a bit hesitant to try the change. The pickups are expensive and I really do not have an option to try before I buy. And I am still feeling very guilty about leaving this instrument in the case. I’d love to take it out and play it.
I have a major event coming up in December. Maybe I should just get the Pro-90s and get the Collings out for that event.
The video is a bit long for many people who browse the Internet however, if you are a guitar enthusiast, this is a fascinating look into how a master builds a guitar.
A friend passed me this story which reads in part:
This protest outside the UberEats office in south London on August 26 is one of the first industrial disputes to hit the city’s so-called gig economy. It is a strange clash. These are workers without a workplace, striking against a company that does not employ them. They are managed not by people but by an algorithm that communicates with them via their smartphones. And what they are rebelling against is an app update.
- Those that own and control capital (owners of the algorithms)
- Those that tend to and build the algorithms for the capitalists (technocrats)
- Those that compete for lousy wages to serve the capitalists and the technocrats (the other 99%)
That might be a very frightening society.