4/01/2008

Higgins Speech Technologies Introduces First Automated Accent Improvement System

April 1, 2008

SAN FRANCISCO, CALIFORNIA – Today Higgins Speech Technologies, LLC, a privately held startup company here, announces availability of its innovative speech service, Higgins, on two partner networks, Google Talk and Skype. Higgins is sophisticated artificial intelligence software that automatically corrects accents of non-native speakers’, making them sound as proper English.

Named after Henry Higgins, a phonetics professor of Bernard Shaw’s play Pygmalion, Higgins, the software, promises to offer to millions of users world-wide what Higgins, the professor, offered to Eliza Doolittle – namely, ameliorate accents.

Although closely related to speech-to-text software, Higgins is substantially different. Higgins is speech-to-speech software; it transforms accented speech sounds into speech sounds that sound as native English.

Notably, Higgins achieves this without attempting to recognize relationships between sounds and written words. When Higgins hears a word it does not know what the word means, but it can repeat it almost without accent.

Higgins is based on sophisticated machine learning (ML) algorithms. As the name tells it, the software analyzes huge sets of data – called training corpora in the industry parlance – and deduces millions of statistical dependencies. In a sense, it learns the rules of the game, by example.

Machine learning has been extensively applied to analyzing and processing written text. E.g., famous Google’s “Did you mean?” spelling corrector is based on this approach. When analyzing written text, a ML system would be fed millions of random documents written in a specific language. It would then quickly learn that certain sequences of letters occur much more often than others. E.g., it would learn that Pigmalion almost never occurs, while Pygmalion is quite common. The spelling corrector would then suggest a user who typed Pigmalion to change it to Pygmalion. Notably, it will do it without consulting Webster dictionary and knowing anything about what Pygmalion means.

Essentially, Higgins Accent Improvement System does to sounds what Google spellchecker does to written words. Before becoming operational, Higgins is trained on a huge corpus of digital recordings made by native English speakers, as well as by people with accents. It learns that certain short sound bites – lasting about 1 second and typically representing one syllable – occur very often while others almost never. When training is completed, Higgins is ready to correct pronunciation.

This unique approach has a number of tremendous advantages. Firstly, though only American English – or “CNN English” – is currently supported, it can be trained to correct accents in almost any other language. All is needed is to feed Higgins hours of recordings made by native speakers of French, German, Finnish or Swahili.

Secondly, Higgins preserves speaker’s individuality. It does not replace accented word with a recording made by a CNN anchor. It analyzes wave-fronts, as well as wavelet transforms, and slightly reshapes them. An abnormal wave-front is gently pushed towards more common one, using what is known in the industry as simulated annealing algorithms. As a result, male voices remain distinctly male; high pitch remains high; and intonations do not change much either. In most cases, one can still recognize the speaker. It is still Eliza Doolittle, but now she speaks Queen’s English, not Cockney.

Though providing reasonable quality out of the box, Higgins works better if trained on typical accents. Currently, Chinese, Indian, French and Russian are supported.

The drawback of Higgins approach is that to work in almost real-time – currently, the delay is barely noticeable, being similar to average over the Internet conversations – Higgins requires huge computational resources. Currently, there are only two public networks in the world that can deliver adequate throughput: Skype, owned by eBay (NASDAQ: EBAY), with 276 million registered users around the world, and Google Talk, operated by Google, Inc. (NASDAQ: GOOG). Higgins is also licensing its technology to Tandberg of Lysaker, Norway, a leading provider of high-definition telepresence video-conferencing equipment.

“We are honored to work with the leaders of the industry, and grateful to Google and Skype for selecting our technology,” – said Ashutosh Gupta, CEO and co-founder of Higgins. “We hope our service will help millions of users around the world to communicate more easily, reducing misunderstanding and increasing productivity of remote meetings.”

“Modern knowledge economy implies unimpeded exchange of information between team members working in remote locations. Strong accents, combined with often poor quality of cellular phone connections, legacy long-distance telephone networks and video conferencing equipment, makes such meetings annoying and unproductive.”

“I flew 4 times to Bangalore and 3 times to St. Petersburg in the last year alone, to have face-to-face meetings with my colleagues in our remote development offices there,” – said Fritz Flugzeugbauer, an engineering manager at Motorola (NYSE: MOT) in Sunnyvale, Calif. “The pain and irritation of talking to them over the phone often overweighs the inconvenience of a 19-hour flight in an economy seat, battling horrible jetlag caused by adjusting to 11 hour time difference, surviving 100F (38C) heat or -40F(-40C) cold, 3-hour commutes in bumper-to-bumper traffic, thickening pollution, smoke-filled restaurants, cruelly hot spicy food, vodka by the glasses, and so on. If audio- and videoconferencing equipment provided the same quality of human interactions as face-to-face meetings most of these trips would not happened.”

“Now, with Higgins, it is better than face-to-face,” – continues Petr Kislodrishtchenko, Higgins’s CTO. “When we were Beta-testing our system at a major American corporation, we noticed that workers of Russian, Indian and Chinese origin began scheduling video-conferencing meetings over Tandberg, though all of them were on the same campus, sometimes being only blocks away from each other.”

“Realizing this opportunity, Rhonda, a Motorola’s outsourcing contractor in Vladivostok, Russia, is Beta-testing embedded client application for Google’s Android platform that would improve productivity of face-to-face meetings. Since computational power of a mobile phone is insufficient for real-time processing the conversation will be wirelessly transmitted to Google servers, processed and sent back, all in real time. The company plans to release the application shortly after first Android phones hit the streets.”

However, it is Higgins’s potential to cut on un-needed travel that attracted attention of Al Gore, former Vice President and Nobel Prize winner, who agreed to join Higgins’s Board of Directors, to represent Kleiner Perkins Caufield and Byers, a legendary venture capital firm where he is a Partner, and which made an investment into the company.

“We are excited with Higgins’s potential,” – said Al Gore. “Not only will it help companies world-wide to save billions of in travel costs, it will help humanity to reduce airline fuel consumption, thus restricting carbon dioxide emissions. Recent NASA climate models indicate that deploying Higgins on Skype and Google Talk alone will result in reducing CO2 emissions by 3.14 billion metric tons over the next 21 years. This, in turn, will translate into lowering the Earth’s temperature by 0.2718C.”

Diamonds are forever

April 1, 2006

The LifeGem is an artificial diamond created from the ashes of your loved one as a memorial to their unique life. You wear it as a ring, necklace, or tie tack:

http://www.lifegem.com/

“A tie tack?” – chuckled Lev Blanch whose wife Lynn recently died in a motorcycle accident. “I have not worn a tie for 12 years between my wedding and Lynn’s memorial service; and will not likely wear one for the next 12 years. I’d rather have Lynn’s ashes embedded into something I touch more often, and in more critical moments of my life.” So, Lev, an avid windsurfer, commissioned LifeGem to convert carbon of Lynn’s ashes into carbon fiber, which was subsequently incorporated into a custom carbon mast for his windsurfer gear. “Now, every time I go for a back loop on a 12 foot wave I depend on Lynn for my survival, as I did when she was alive. I’ve always known that I could count on her.”

First MP3 virus infects millions of iPods

The virus rapidly spreads trough Grokster, Kazaa, BearShare and other popular P2P networks, jumping from iTunes software to iPods. RIAA denies involvement.

April 1, 2005

When Josh Smith, 17, turned on his iPod on his way to school this morning nothing sounded suspicious. He was happily pedaling his bike while enjoying his favorite Nirvana songs. Then, some 30 seconds into the song, the Nirvana music faded and new music appeared. Violins, many violins. “It was disgusting. I almost choked. I haven’t been exposed to such nasty music for many years. It was like a torment.” (It was later confirmed that the boy was exposed to Vivaldi’s “Four Seasons”.) “I first thought it was just one corrupted song; that somebody played a joke on me”, - continued Mr. Smith who then sheepishly admitted that he had recently downloaded “few dozen songs” from Kazaa. “I skipped the song. Things returned to normal. Then, suddenly, more violins, and then the organ. Yikes! I began browsing through my iPod: at least half of my songs have been vandalized. Vivaldi, Bach, Mozart, jazz, country, blue grass – my entire collection was ruined.”

“We are facing a massive worm attack on popular P2P networks,” – confirms Eugene Kaspersky, the Head of Virus Research at Kaspersky Labs. “This is apparently the first successful mp3 virus.” It was widely believed that mp3 standard was virus-safe. It appears that somebody managed to find and exploit a vulnerability in iPod’s embedded software, which lacks the level of anti-virus protection of large desktop operating systems. Playing an infected song causes iPod’s buffer overflow and malicious code sneaks into the iPod. When synchronized, the virus jumps into iTunes software client. It then connects to a remote server that uploads more malicious code, which in turn infects more mp3 files stored on the hard drive. And that is not whole story. The virus apparently scans the PC for Grokster, Kazaa, BitTorrent or other file-sharing software. If it finds it it copies itself onto other computers on the network. As a result, about 10% to 15% of all files on the major networks are infected. “Apparently, the virus writers released the virus a few weeks ago, and when it has widely spread they suddenly activated the payload”, - suggests Mr. Kaspersky.

Although the virus is easily detectable removing it is problematic. Kaspersky Labs and other anti-virus companies shall be able to come up with software that removes the virus from the PCs. Unfortunately, this does not help. The virus remains on iPod and would copy itself on iTunes at the next synch. And removing it from iPods seems to be beyond the reach of virus hunters. iPod runs a proprietary embedded OS developed by Pixo. Kaspersky, Symantec and other anti-virus companies have no experience with it. Besides, it’s a closed platform; the documentation is sparse at best. Few industry insiders even went as far as to hint that Pixo might be behind the attack: the disagreement between Pixo and Apple is an open secret in Silicon Valley. Pixo believes that Apple has not properly compensated it. Since such allegations would be next to impossible to substantiate it doesn’t make sense even to ask Pixo to rebuff them.

Other conspiracy theorist was quick to point to RIAA, the music industry consortium, currently battling Grokster in Supreme Court. Its representative has denied the allegations. This has not convinced some: the music industry has recently bankrolled a couple of secretive software start-ups whose apparent goal was to hack the file-sharing networks.

The latest reports from the field seem to affirm Pixo’s and RIAA innocence: a new type of malicious payload has been reported. A number of iPod owners had their songs interrupted by radio-style advertising. Ads hawking Viagra, penis enlargement pills and porno sites have been reported. When you correspondent called the provided phone number he was indeed offered to purchase Viagra. The phone number appeared to be rented from Skype (through its Beta SkypeIn service) and judging by the accent of the salesmen was terminated somewhere in Eastern Europe. Asked if the company is afraid of legal action, the representative brazenly replied that people who steal copyrighted music won’t dare to appear in court, even if they manage to figure out in which country.

“When the infected mp3 file is played, the sound quality is somehow affected by the virus. If you suspect that your song sounds a bit differently, turn off your iPod immediately,” – suggests Apple’s Benjamin Miller. “In about 15 seconds the virus copies itself onto the iPod. After that, the best you can do is to throw your iPod away and buy a new one.”

“This is only a prelude of things to come”, comments computer security expert Bruce Schneier. “Proprietary embedded systems are hackers’ paradise. Next year, expect full-fledged 30 sec Viagra TV commercials on your TiVo”.

Can you outsource vacuum cleaning to Russia?

April 1, 2004

Data entry, software development, customer support, call centers, tax preparation – any type of work that can be done remotely has been outsourced to India, China or Russia. What is next?

Vacuum cleaning the floors of America seems to be an unlikely candidate. You need to be physically present to operate the vacuum cleaner. American robotics manufacturer iRobot, Inc. and the Russian space agency beg to differ. A fleet of iRobot’s vastly popular Roomba robotic vacuum cleaners will be remotely operated out of semi-abandoned space flight control center in Plesetsk, a remote town in the Russian frigid far North, beyond the Polar circle.

While iRobot’s Roomba Floorvacs (http://www.roombavac.com/products/default.asp ) can operate completely autonomously, sometimes additional remote control could be beneficial, especially when sweeping the floors of factories, office spaces divided by cubicles, warehouses and other businesses. To address this market, iRobot announced a new model of Roomba, complete with the remote control and inexpensive wireless camera.

To capitalize on the growing a ubiquity of WiFi wireless LANs, iRobot cleverly choose WiFi as a communication medium, thus allowing connecting the robo vacs to the enterprise LANs and on to the Internet. As a result, the floor sweepers can be controlled from any in the world.

In a joint venture with the Russian space agency, a remote control center will be set in Plesetsk (plesetsk.org) and staffed by local cadres. The choice of Plesetsk is not accidental. One reason is that the salaries in Plesetsk are much lower than in Moscow: $200 a month is viewed as a rather generous pay. The main reason however is the available infrastructure and abundance of highly qualified workers trained to remotely operate Russian military and civilian satellites and even the Lunokhod (http://en.wikipedia.org/wiki/Lunokhod_1), the Russian Moon rover. Being similar to American Opportunity and Spirit Mars rover, the Lunokhods roamed the surface of the Moon in early ‘70s.

“After finding the path between the huge boulders 300,000 mi away, in 1/6 gravity, navigating the floors of Boeing assembly plant in Seattle will be like walk in the park,”- says Fedor Krivoruchko, 62, who had to sell vodka and sausage as a street vendor after he was laid off from the space center as Russian space program was drastically downsized following the collapse of the Soviet Union.

Did Saddam get Russian GPS jammers? The answer is at a Moscow strip club.

If Saddam did get Russian GPS jammers it was rusty rubbish. For the modern stuff, look at Moscow casinos, strip clubs and brothels.

April 1, 2003

“Honey, I never knew you were that fond of classical music,“ the voice of my girlfriend woke me up in my hotel room in Moscow, “I wouldn’t expect you to go listen to Shostakovich Sixth Symphony on Friday night. Did you enjoy it?”

“uh-hu… err… How did you know where I was last night?”

“Easy, darling. Remember, when you arrived in Moscow and rented your mobile phone you subscribed for a people finder service. If something happens to you, well, kidnapped or in trouble, I would know where you are and would direct police or security guys to your rescue. Well, yesterday I felt uneasy and decided to check the web site of the mobile operator. It showed that you were at Bolshaya Nikitskaya 13, and that was Bolshoi Conservatory Hall.”

“Oh, well, it really works … amazing… now I really feel protected. And you would no longer worry about me. Great.”

What the hell is going on, I asked myself. Conservatory Hall? Shostakovich Sixth Symphony? Damn, I was at Hungry Duck, the dirtiest hole in Moscow! Drunk Russian girls dancing on the table, completely naked. Hookers and stuff… vodka by the glasses…

I rushed to the mobile operator’s web site. Yes, indeed, the log showed that on Friday night I was at Bolshoi Conservatory Hall! It was worth an investigation.

Calls to the Conservatory Hall and BeeLine, the mobile operator, lead to nowhere. Folks at Hungry Duck also refused to tell me anything over the phone but hinted that I may find out something if I’d drop by in person and talk to their security.

“You should thank us, fellow. We probably saved your marriage. Or was it your girlfriend? You don’t care? Whatever,” the security guy laughed loudly, after he drank, in one gulp, a double shot of Stoli I bought him. “You, studs, tell your wives that you are at Bolshoi and come here to screw around. It takes them only one visit to BeeLine’s web site to find out that you’re cheating on them. Patrons do not like it. It’s bad for business.”

“Well, luckily, we found a solution. One Russian company, formerly a top-secret defense contractor, makes great boxes. You hang one by the ceiling, and it jams the GPS satellite receiver in your mobile phone. You know, the old stuff like that would just make the GPS receiver inoperable. The stuff we got is smarter. It fools the receiver. The signal is so strong that it completely overwrites the faint signal from the satellite. I would enter any longitude / latitude in the box and your GPS receiver would obligingly report it back to the mobile operator.”

“Wait a minute,” a dark thought crossed my mind, “A GPS jammer? A Russian defense contractor? One that was accused of selling GPS jammers to Saddam Hussein? What did they call it? Aviaconversia?”

“Err…, no, buddy, I didn’t tell you that,” the security dude replied, quickly glancing around. “But I tell you one thing. If Saddam gets the box that hangs by my ceiling, you Americans are in deep trouble. Your Cruise missiles would fly back home. Funny, isn’t that?” – he chuckled. “Or they would hit unexpected targets, whatever Saddam enters into the jammer. And, you know, the guy is wicked, he gassed his own people with Sarin. He could direct your missile on his folks again, to rally your greenie and leftie fools against the war, and Bush government.”

“But, you now, friend,” the security guy continued. Three empty glasses were now lined up in front of him on the counter. “The old comrades, from the organization, you know, those comrades who build these smart boxes, I don’t think they sold any of this stuff to Saddam lately. We have our own problems with Muslims. Chechnya and stuff, you know. Well, honestly, Osama or not, the guys would probably sell their mothers if you paid them enough cash. But this stuff is expensive, I tell you. Saddam doesn’t seem to have enough dough to pay for many boxes.”

“The old comrades are now good capitalists. They go wherever the market is. And the market is here. Nightclubs, casinos, whorehouses. There is even an inexpensive short-range model that covers like 30 meters. People say some classy call girls carry them in their purses.”

“Well, enough said. I have some business to attend. And look at this beauty in the corner. She’s been glancing at you for the last quarter hour. Go talk to her. She likes American students.”

“Don’t worry, your girlfriend in Vermont – what? sorry – Wisconsin would never know. You are at Le Club tonight, listening to Alexei Kozlov’s Arsenal jazz quartet.”

Junk DNA: Evidence of Alien Life Form?

Junk DNA: Evidence of Alien Life Form?

April 1, 2002

Researchers at Cornell University will be announcing at a press conference today that they made an astonishing scientific discovery: they believe so-called non-coding sequences in human DNA is no less than genetic code of an unknown extraterrestrial life form.

Non-coding sequences are common to all living organisms on Earth, from molds to fish to humans. In human DNA they constitute almost a half of the total genome, says Prof. Sam Chang, the group leader. Non-coding sequences, also known as junk DNA, were discovered years ago, and their function remained mystery. Unlike normal genes, which carry the information that intra-cellular machinery uses to synthesize proteins, enzymes and other chemicals produced by our bodies, non-coding sequences are never used for any purpose. They are never expressed, meaning that the information they carry is never read, no substance is synthesized and they have no function at all. These junk genes merely enjoy the ride with hard working active genes, passed from generation to generation. What are they? How come these idle genes are in our genome? Those were the question many scientists posed and failed to answer, until the breakthrough discovery by Prof. Chang and his group.

Trying to understand the origins and meaning of junk DNA Prof. Chang realized that he first needs a definition of "junk". Is junk DNA really junk, or does it contain meaningful information, which is not claimed for whatever reason? He once mentioned the question to an acquaintance, Dr. Lipshutz, a young theoretical physicist turned Wall Street derivative securities specialist. "Easy," replied Lipshutz. "We'll run your sequence through the software I use to analyze market data, and it will show if your sequences are total garbage, "white noise", or there is a message in there." This new breed of analysts with strong background in math, physics and statistics are getting more and more popular with Wall Street firms. They sift through gigabytes of market statistics, trying to uncover useful correlation between the various market indexes, and individual stocks.

Working evenings and weekends, Lipshutz managed to show that non-coding sequences are not all junk, they carry certain information. Combining massive data base of the Human Genome Project with thousands of data files developed by geneticists all over the world Lipshutz calculated the Kolmogorov entropy of the non-coding sequences and compared it with the entropy of regular, active genes. Kolmogorov entropy, introduced by the famous Russian mathematician half a century ago, was successfully used to quantify the level of randomness in various sequences, from time sequences of noise in radio lamps to sequences of letters in 19th century Russian poetry. By and large, the technique allows researchers to quantitatively compare various sequences and conclude which one carries more information than the other. "To my surprise, the entropy of coding and non-coding DNA sequences was not that different", continues Lipshutz. "There was noise in both but it was no junk at all. If the market data were that orderly, I would have already retired."

After a year of cooperation with Lipshutz, Chang was convinced, there is a hidden information in junk DNA. But how could one understand its meaning if the information is never used? With active sequences you try to watch the cell and see what proteins are being made using the information. This wouldn't work with dormant genes. There will be experiment to test a hypothesis, one should rely on the power of his thought. The information should be deciphered as Mayan or Egyptian writings. Prof. Sam Chang solicited help from three specialists in the field, but none of them managed to find a solution. There were no cultural clues, no references to other known languages, the field was too alien for the linguists.

"I asked myself: who else can decipher a hidden message?" Chang continues. "Of course, cryptographers! And I began talking with researchers at the National Security Agency. It took me few months to make them return my calls. Were they running background checks on me? Or were they too busy lobbying senators on retaining and strengthening their authority to control exports of encryption technologies? Eventually, a junior fellow was assigned to answer my questions. He listened, requested my questions in writing and after another few months turned me down. His message was polite but meant "Go to hell with your crazy ideas. We are a serious agency, it's National Security, dude. We are too busy."

“Well, Sam, forget the Government, talk to the private sector. And I began approaching computer security consultants. They were genuinely interested, and a couple of them even began working on my project, but their enthusiasm always faded after a month. I kept calling them until one nice fellow told me: "I'd love to work on your project if I had more time. I am overbooked. Emissaries of major banks and Fortune 500 companies are begging me to plumb the holes in their networks. They pay me $500 an hour. I can give you an educational discount, can you afford $350?" Scrambling $15/hr for a post doc is a big deal in academia, $350 sounded as something extraterrestrial." Eventually Prof. Chang was referred to Kharen Musaelian, a cryptographer in the former Soviet republic of Armenia. Poor fellow barely survived on a $15 a month salary and occasional fees for tutoring children of Armenian nuveau riches. A $10,000 research grant was a struck of luck, he began working like a beaver.

Kharen promptly confirmed the findings of his Wall Street predecessor: the entropy indicated tons of information almost in the clear, it was not a strong crypto system. It did not appear to be a tough problem. Kharen began applying differential cryptanalysis and similar standard cryptographic techniques.

He was two months in the project when he noticed that all non-coding sequences are always almost preceded by one short DNA sequence. A very similar sequence usually followed the junk. These segments, known to biologists as alu-sequences, were all over the whole human genome. Being non-coding, junk sequences themselves alu are one of the most common genes of all.

Trained a cryptographer and computer programmer Kharen sought of the genetic code as of computer code. Dealing with 0, 1, 2 , 3 (four bases of genetic code) instead of 0s and 1s of the binary code was a sort of nuisance, but the computer code was what he was analyzing and deciphering all his life. He was on familiar territory. The most common symbol in the code that causes no action, followed by a chunk of dormant code, what is that? Just playing with the analogy Kharen grabbed the source code of one his programs and fed it into the program that calculates the statistics of symbols and short sequences, a tool often used in decoding messages. What was the most common symbol? Of course, it was "/", a symbol of comment! He took a Pascal code, and it were { and } ! Of course, the code between two slashes in C is never executed, and is never meant to be executed; it is not the code, it is the comment to the code.

Being unable to resist the temptation to further play with the analogy, Kharen began comparing statistical distributions of the comments in computer and genetic code. There must be a striking difference: comments are in English, which has a different distribution of characters than C, Java or Cobol. This should show up in statistics. Nevertheless, statistically, junk DNA was not much different from active, coding sequences. To be sure, Kharen fed a program into the analyzer: surprisingly, the statistics of code and comments were almost the same. He looked into the source code and realized why: there were very few comments in English between the slashes, it was mostly C code the author decided to exclude from execution, a common practice among programmers.

One who wrote the human genetic code was not very well organized, he was a rather sloppy programmer. At one point Kharen began thinking about the divine hand, but after analyzing the spaghetti code inside junk DNA sequences he convinced himself that whoever wrote the code was not God. It looked like rather somebody from Microsoft, but at the time human genetic code was written there was no Microsoft on Earth.

On Earth? It was like a lightning... Was the genetic code for all life on Earth written by an extraterrestrial civilization and then somehow deposited here, for execution? The idea was mad and frightening, and Kharen resisted it for few days. Then he decided to proceed. If the non-coding sequences are parts of the program that were rejected or abandoned by the author, there is a way to make them work. The only thing one needs to do is to remove the symbols of comments and if the portion between the /* .... */ symbols is a meaningful routine it may compile and execute. Following this line of though Kharen selected only those non-coding sequences that had exactly the same frequency distribution of symbols as the active genes. This procedure excluded the comments in Marcian or Q, whatever it was. He selected some 200 non-coding sequences that most closely resembled real genes, stripped them of /*, //, and similar stuff and after few days of hesitation sent e-mail to his American boss, asking him to find a way to put them in E-coli or whatever host and make them work.

Chang did not replied for two weeks. "I thought I was fired", confessed Dr. Musaelian. "With every day of his silence I more and more realized how crazy my idea was. Chang would conclude I was a schizophrenic and would terminate the contract. Chang finally responded and, to my surprise, he did not fire me. He had not bought my extraterrestrial theory but agreed to try to make my sequences work."

Biologists have attempted to make junk sequences express, without much success. Sometimes nothing turned out, sometimes it was junk. It was not surprising: grab an arbitrary portion of the excluded computer code and try to compile it. Most likely, it will fail. At best, it will produce bizarre results. Analyze the code carefully, fish out a whole function from the comments, and you may make it work. Because of careful Musaelian's statistical analysis 4 of the 200 sequences he selected began working, producing tiny amounts of a chemical.

"I was anxiously awaiting the response from Chang," says Dr. Musaelian. "Would it be a more or less normal protein or something out of this world?” The answer was shocking: it was a substance, known to be produced by several types of leukemias in men and animals. Surprisingly, three other sequences also produced cancer-related chemicals. It no longer looked like a coincidence. When one awakens a viable dormant gene it produces cancer related proteins. Researchers began searching Human Genome Project databases for the four genes they isolated from junk DNA. Eventually, three of the four were found there, listed as active, non-junk genes. This was not a big surprise: since cancer tissues produce the protein it's likely there is a gene somewhere which codes it. The surprise came later: in the active, non-junk portion of the code the gene in question (the researchers called it jhlg1, for junk human leukemia gene) was not preceded by the alu sequence, i.e. the /* symbol was missing. However, the closing */ symbol at the end of jhlg1 was there. This explained why jhlg1 was not expressed in the depth of the junk DNA but worked fine in the normal, active part of the genome. One who wrote the human genetic code was a very sloppy programmer: he excluded portion of the code by embracing them in /* ... */ but missed some of the opening /* symbol. His compiler seems to be garbage, too: a good compiler, even from terrestrial Microsoft, would most likely refuse to compile such program at all.

Prof. Sam Chang with his students began searching for genes associated with various cancers, and almost in all instances they discovered that those genes are followed by the alu-sequence (i.e. the comment closing symbol), but never preceded by the comment opening /* gene. "We are convinced that cancer tissues were never meant for terrestrial life. They belong to a different planet, to an alien life form. This explains why diseases result in cell damage and death, whereas cancers lead to reproduction and growth. It's an alien life that tries to grow inside the patients' bodies. Because only few fragments of this alien genome are expressed, they never lead to coherent growth. What we get with cancer is expression of only few of the alien genes that lead to bizarre and apparently meaningless chunk of living cells, though with its own veins and arteries, and its own immune system that vigorously resists all our anti-cancer drugs.

Our hypothesis, which we believe we will soon be able to prove, is that a higher alien life form was engaged in creating new life and planting it on various planets. Earth is just one of those planets. We do not know the motives of our creators: whether it was a scientific experiment, or the way of preparing new planets for colonization by the master race, or is it ongoing business. Perhaps, our creators grow us the may we grow bacteria in Petri dishes. Whatever the motive, the extraterrestrial programmers who worked on the genetic code were working on several projects. Most likely, they have been writing a big program product which should have produced various life forms for various planets. They have been also trying various solutions. They wrote the code, executed it and did not like some functions. The big project was underway. A lot of ideas, a lot of classes, a lot of incomplete procedures. Of course, it was behind the schedule. Few deadlines have already passed. Then the management began pressing for an immediate release. The programmers were ordered to cut all their plans for the future and to concentrate on the Earth project, to meet the pressing deadline. There was no time to finish the overall, multiple planet project. So, the programmers merely cut pieces of the code that were not intended for Earth. However, at that time they were not quite certain which functions may be needed in the future upgrades. Besides, they had no time to delete the lines of code. So, instead of deleting the lines they converted them into comments, and missed few /* symbols, thus presenting the mankind with the gift of cancer. "

"If we were able to efficiently insert genes into the chromosomes of living men, our breakthrough discovery would mean instant cure for all future cancer cases. The only thing we need to do is to put missing /* symbols before the rogue genes. Theoretically, we can do it in the laboratory, but we cannot implant the repaired DNA into living subjects. The mystery of cancer is solved but no quick cure shall be expected. The best thing we can do is to try nourish new, cancer-free line of humans with debugged genetic code. For us, and our children, there is no hope on the horizon."

"To be precise, we cannot show that the other life form was intended for another planet. Technically, what we see is the code from another project. This may be just a new race which is also intended for Earth. It's more comforting to think that the creators prepared it for deployment on another planet, and is not planning to replace the current version with major upgrade. We do not want to be ver. 3.11, do we?

We have to come to grips with the notion that every human on Earth carries genetic code for his extraterrestrial cousin, or major future upgrade. It may shake our beliefs in our power over our own destiny, but poses no immediate danger. There is no reason for panic. Our creators are not apparently interested in the fate of their program product, and we do not believe they would intervene after this news are announced. Judging by the fact that they did not fixed the cancer bug in the last 2 billion years, they delivered the program without technical support or dropped it long ago.

We have been already swamped with calls and e-mails from politicians, journalists and concerned citizens. Dr. Lipshutz and myself will address those concerns during our press conference to be held at 5 p.m. on the April 1 at the Clark Hall of Cornell University.”

Linux hackers took control of Iridium satellites, Mars Polar Lander


April 1, 2000

LinEP group of citizen-programmers today announces that it succeeded in uploading a stripped down version of Linux OS into computers which control a number of space crafts, including 13 of 66 of Iridium satellites and Mars Polar Lander. This allowed the group to take full control of the apparata.

LinEP proudly announces that Mars Polar Lander is successfully revived. “The first signal we received from the craft was extremely week,” says LinEP spokesman. “After four months on the surface of the red planet, the batteries were dangerously low. We had only few minutes to realign the antennas and solar panels. LinEP engineers were up to the challenge. With the communication antennas pointed to the Earth and batteries being recharged Mars Polar Lander is under our full control. The early tests indicate that most lander’s systems and science instruments are in a good shape.”

LinEP issues an urgent appeal to Universities and scientific laboratories whose gauges and meters are installed on Mars Polar Lander to immediately contact LinEP. The craft has a limited life span. Every hour counts.

LinEP also appeals to the Linux open source community for help with writing drivers for the craft’s scientific devices. LinEP programmers have written the drivers for the lander’s main communication and control system, and two scientific devices. More drivers are needed.

One of the devices under LinEP control is Mars Microphone. It successfully passed functionality tests and will be switched on at 6 p.m. PST on Saturday, April 1, provided the batteries are sufficiently recharged by then. The transmission will last for about three minutes and will be available as live webcast at LinEP website (http://linep.homepage.com/microphone.html).

“We discovered that NASA was unable to establish communication with the lander because of fatal crash of the on-board computer’s operating system. Only wiping out flawed OS and loading Linux kernel revived the computer,” says LinEP spokesman.

The other key to success was LinEP ingenious use of Russian terrestrial antennas. These antennas and phased antenna arrays have been recently declassified and transferred to civilian control. They appeared to be superior to those at NASA’s disposal. LinEP expresses its gratitude to the local personnel who, despite clear danger of retribution from Russian authorities, provided LinEP with access to these marvels of modern technology. (For obvious reasons, LinEP withholds detailed information about antennas it uses.)

A similar tactic of replacing inferior operating system with a stripped down and specially adapted version of Linux allowed LinEP to take control of 13 Iridium communication satellites.

“This new approach is broad and general, and will no doubt be used many times in the future, by LinEP and others,” says LinEP spokesman. “Only our distaste of business methods patents as a class, and recent pioneering hack of Netpliance’s i-Opener by Ken Segler stopped us from applying for a US patent.”

With mounting costs and a small subscriber base, Iridium declared bankruptcy in August of 1999. Unable to raise new funds, Iridium asked the bankruptcy court to approve a plan that would crash the Iridium satellites into the atmosphere and let them burn up. There exist alternative plans. S.O.S. / Save Our Satellites (http://www.saveiridium.com), a “group of concerned individuals”, plans to acquire the Iridium Network and open it to everybody.

LinEP took on Save Our Satellites’ “Hack Iridium” challenge, and succeeded. Now, SOS and the entire open source community need not to come to the courts, feds and Iridium board as beggars. With 13 satellites firm under LinEP’s control, LinEP and open source community can negotiate with the other side as an equal partner.

LinEP expresses its apologies to the open source community for not immediately publishing the source code of its hack that allows the group to upload Linux kernel onto a variety of civilian and military computers and microcontrollers. (The source code of various specific device drivers will be shortly available from LinEP web site.)

About LinEP. LinEP (“Linux in Every Pot”) is a recently formed international group of progressive hackers dedicated to improving life standards of people everywhere through upgrading computer software that controls a wide variety of devices, apparata and vehicles, from “smart” microwave ovens, to network appliances, to battleships, to airplanes, to satellites.

Stealth fighter crashed by crashing Windows

April 1, 1999

According to anonymous sources close to the Pentagon the F-117 stealth fighter was not brought by a Yugoslav anti-aircraft missile. It fell victim to a crash of its on-board computer. That particular plane was one of eight experimental planes whose computer was running on Windows CE operating system. According to the pilot, he was returning back to base when he heard a familiar taah-tahm tune. The sound was very familiar but definitely did not belong to the cockpit environment. A second later the pilot realized where he heard it so many times before. It was a sound of Window shutting down. Another second later the computer screen turned black and the plane began behaving erratically. The pilot attempted to reboot the computer while trying to keep the jet flying. The plane was barely responding to the controls – a behavior expected from a “fly-by-wire” aircraft.

Unlike conventional planes that can be flown manually F-117 needs the computer just to maintain the straight course. If the on-board computer of F-117 is turned off the plane becomes aerodynamically unstable and even the best pilot cannot control it. Indeed, Windows were still loading when the jet began rapidly changing pitch angle, steeply climbing up and then plunging down. In a few seconds of a wild ride the wings began to flatter and eventually the right wing fractured and separated from the fuselage. The pilot hit eject button.

Though the Pentagon declined to comment the evidence points to the allegations to be true. Air combat command grounded the remaining seven jets from the experimental Windows CE group immediately after the incident. According to an airforce technician at Aviano air base in Italy who spoke on condition of anonymity the airforce engineers believe that it was the recently discovered “50 days” glitch that brought down the plane.

It was recently reported that Windows 98 crashes after 49.7 days of uninterrupted work because of the timer buffer overflow. Apparently, the same glitch was present in the version of Windows CE used in the crashed F-117. Indeed, the flying log shows that the plane was in continuos operation for 50 days. The 2 months preceding the crash the plane was used very extensively. It was never used so extensively before. Even when the plane was grounded for express maintenance and refueling the computer was not powered down.

Switching eight stealth fighters to Windows CE was a part of broader strategy by the Pentagon to control costs by relying on already developed civilian technology and off-the-shelf components. A similar mishap happened a couple of years ago when Windows NT crashed and paralyzed a Navy battleship for 2 hours. It is expected that senior Pentagon officials would hold a news conference on the 1st of April to announce whether or not the U.S. armed forces will continue relying on Windows operating system.

From Guiding Troops to Picking Wild Mushrooms

A surprising new application of GPS technology.

April 1, 1999.

From aiming intercontinental ballistic missiles to picking wild mushrooms – such is the evolution path of one once classified defense technology. A group of Silicon Valley geeks is combining their love of high tech with their other passion – hunting wild mushrooms in the pine groves of Northern California. A group of enthusiast within San Francisco Mycological Society is going to employ GPS (Global Positioning System) technology to increase precision of determining the location of wild mushrooms in the forests.

Until recently, mushroom hunting was virtually unknown in the U.S. In other part of the world, including Italy, France, and China, it’s extremely popular. In Russia, it’s a national pass-time, compared in popularity only to playing ice hockey and drinking vodka. In fact, it were Russians who first began using GPS technology for hunting mushrooms in the thick forest surrounding Moscow. Now, Russian programmers working in Silicon Valley are importing the technology and share it with their new American colleagues.

Every experienced mushroom hunter knows that the mushrooms grow in the same place year after year. This is because the mushrooms are seasonal growths on vast underground structures, called mycelium. If a picker finds a group of mushrooms one year there are very good chances that there will be good bounty at the same location the next year, and year after. Being able to locate the place year later greatly improves the productivity of the hunter. In Russia, many babushkas have their secret spots they revisit for decades. They pick lots of premium mushrooms, to the envy of younger folks who are wandering in the forest at random, returning home with empty baskets.

It is not easy to find one specific pine tree among thousands or virtually identical ones in a thick forest. All trees look alike. And it’s harder to navigate as you step off the trail with its signs and trail blazes. Old ladies rely on their instincts. Impatient young geeks rely on cutting edge technology.

With right technology, it works like 1-2-3. Find a good mushroom (better a bunch of). Determine your position with a GPS device connected to a Palm Pilot. Enter the coordinates into a database. Go find next mushroom. Continue. Next year, load the map marked with last year’s spots into your Pilot, or directly into the GPS device, and go straight to the best secret spot. To the babushkas envy, the device will help you find the very same tree you visited a year ago, in minutes.

High tech gives the techno-savvy even sharper edge over the babushkas. Before the forage, in the comfort of your room, you examine the map and determine the optimal path. You do not want to wander too much back and forth, you want to visit your secret spots as fast as possible.

Here is where the geeks have an edge. The problem of visiting a set of given spots in minimal time is the well known traveling salesman problem. It has been studied by thousands of computer scientists, economists and mathematicians. It is almost as famous as recently proven Fermat’s last theorem. The exact solution of the traveling salesman problem is still not found, and many mathematicians believe will never be, but there are thousands of approximate solutions that give the paths that are only few percentage points longer than the minimal ones. For all practical purposes, a good approximate solution is as good as the absolutely minimal one.

With all this in mind, Alexander Shen and Fedor Sherstyuk, two Russian outdoor enthusiasts, avid mushroom pickers and GPS buffs have developed a software product, called Gribnik (Russian for “mushroom hunter”). The program maintains a data base of the promising spots and calculates the optimal path in seconds. The results are superimposed on a local map and downloaded into a Pilot or directly into a GPS device. The shareware program became so popular in Moscow that the friends are now working on a commercial version. An English language version of Gribnik will be available in the fall of 1999, in time for the season.

The standard accuracy of a typical GPS is about 50 m (150 ft), which is helpful but does not allow one to pinpoint the mushroom. A differential GPS which relies on a fixed ground station along with the usual three satellites could render the 10 cm (4’) accuracy. This leads the hunter straight to the mushroom. To take advantage of such an unprecedented accuracy the friends climb a toll tree in the middle of the forest and put a ground station there. Then they decent and search the surrounding forest.

Unfortunately, even 10 cm precision does not guarantee the mushroom is there. Even if the timing is right and the mushrooms grow well there is a chance that somebody has already picked them up. Knowing this fact in advance will be beneficial to the picker. He would merely skip the spot and go straight to the next one. Gribnik Pro, a soupped up version of the program, offers a solution even to this problem. When one member of a group of hunters picks a mushroom, or finds that the spot has been cleared by a low tech babushka, he marks the spot on the map and shares his knowledge with the others.

The sharing has a drawback. If a persons posts the coordinates of the spot he has just cleared all others become aware of the spot. A good hunter keeps best spots secret. Messrs. Shen and Sherstyuk founded a web site where the users of Gribnik Pro could post the coordinates of their spots in an encrypted form. (To be more precise, a so-called one-way hash function of the coordinates is posted on the web.) This way, the competitors cannot read the coordinates off the web. However, if two people know about one spot, the program would compare the hash function values of the coordinates from the data bases of the two hunters. This allows one hunter to post a note that the spot has been visited without revealing the coordinates of the spot. Those who also happen to be aware of the same spot will be able to understand the message. Others, who have not been to the spot will remain unaware of it. This yet another example of how, with little help from modern cryptography, one can eat a cake and still have it. The cryptographic part of Gribnik was contributed by Roman Avdanin of Invincible Data Systems, Inc. (http://www.incrypt.com)

What lies ahead? At a press conference on the 1st of April in Moscow Alexander Shen, Professor at Moscow Center of Continued Mathematical Education (http://mccme.ru), revealed his plans: “We are going to port the entire Gribnik, including the travelling salesman part, to Palm Pilot and Windows CE platforms and link it to a cell phone. This will allow a group of pickers to exchange data about spots in real time. When a spot is taken the program will remove it from the to-visit list and recalculate a new optimal path, on the fly. You will receive a brief phone call and your Palm Pilot will tell you to skip the birch 13 and proceed straight to the pine 21, across Pereplyujka river, 50 m south west of an abandoned tiny wooden church and log home, where at time of Ivan the Terrible a single hermit might have lived and picked his mushrooms from the same spot.”