Category Archives: Poetry

Don’t Move by Phantogram

A pair of school friends from the rural countryside of upstate New York (near the old race track south of Lake George) have turned simple synth sounds serendipitously into an international music career.

Here’s “Don’t Move” from Phantogram‘s Nightlife EP released by barsuk records:

I’m not your nervous feeling
Each time we say goodnight
You picture buildings burning to the ground
From a basement in the street light
I’m not your drinking problem
A hole is in the sky
It’s not your heart that you’ve been thinking of,
Just the feeling like you’re gonna die

Chorus

I’m not your paranoia
When someone’s at the door
Vision fangs clawing out the throat of a body rising through the floor

I’m not your fortune teller
I’m not your spinning head
I’ll never make you uncomfortable too
This is starting to fuck with my head

All you know how to do is shake shake
Keep your body still
Keep your body still
All you do is shake shake shake
Keep your body still
Keep your body still

Don’t you realize you’re fine
Why can’t you see that you’re fine
You know that you’re still alive
You know that you’re still alive
Why don’t you know you’re alive
Don’t you know you’re alive
Buried in the sky

During times of unemployment and tough career-choices, especially in rural America, their story is an inspiration. They have managed to avoid the pressure for relocation to the big city to be discovered. Information technology not only brought easy access to information but also helped them gain fans quickly and reach a global audience. Hopefully they are not the exception but rather evidence of new rules being written.

In their music I sense a late 1980s revival of etherial melodies and lilting voices over prominent drum beats along the lines of Cocteau Twins, Siouxsie and the Banshees, Kate Bush…at the same time I can’t help but notice that Josh Carter captures perfectly the look and feel of the disenfranchised artists of late 1950s New York. Both periods are known for strong counterculture and youthful escape from the broken rules and fallen dreams of a prior generation. Interesting mashup.


James Franco plays Allen Ginsberg in Howl

Here’s the acoustic version of their single “When I’m Small”:

Lucy’s underground,
She’s got a mouth to feed
Am I underground,
Or am I in between

Lucy’s underground,
She’s got a mouse to feed
Am I underground,
Or am I in too deep

Show me love,
You’ve got your hand on the button now
Sure enough,
You’ve got your hand on the button now

Lucy’s underground,
She’s never coming back
Am I still alive,
Or has the light gone black

Take me underground,
Take me all the way
Bring me to fire,
Throw me in the flames

So show me love,
You’ve got your hands on the button now
Sure enough,
You’ve got your hand on the button now

I’d rather die,
I’d rather die,
Than to be with you

…and here’s the polished version as produced by barsuk records.

Another Mispresentation of new DoE Cybersecurity Model

Earlier I pointed out some misrepresentations of the new DoE Model.

I read the DoE report, called “Electricity Subsector Cybersecurity Capability Maturity Model, Version 1.0,” and I did not find very strong language about a senior executive. In fact, the term CISO (or CSO) does not appear anywhere in the document. […] Likewise the term vice president is only mentioned as a side-bar within the 92 page document.

I can imagine why someone might try to treat the side-bar example as a call for executive leadership in security but that’s not really a fair represenation of the document. It’s a minor and passive point compared with everything else put forward in nearly 100 pages.

But I just found the misrepresentation happening again, this time on Law.com in “Cybersecurity Becoming No. 1 Concern for GCs and Directors”

…the Department of Energy is encouraging electric-power companies to adopt a separate board altogether that’s just devoted to cyber-risk governance, as Network World reports. Under the recommendation, outlined in new guidance [PDF], a “cybersecurity governance board” would “develop a cybersecurity strategy for the utility and recruit a new vice president of cybersecurity to implement a program based on the strategy.”

The quote used by Law.com is from a side-bar to the document clearly labelled “example”. While it may illustrate a model it is neither a requirement a recommendation or encouragement. The actual statement of the model is this:

A cybersecurity program may be implemented at either the organization or the function level, but a higher-level implementation and enterprise viewpoint may benefit the organization by integrating activities and leveraging resource investments across the entire enterprise.

I rank the phrase “may benefit” somewhere below encouragement and definitely below recommendation.

The DoE obviously has left open the possibility that implementation of the program with an enterprise viewpoint also may not benefit the organization…

I don’t necessarily agree with the DoE’s language, but I also don’t want to misrepresent it and overshadow the rest of the document.

Egress Filters for Heat in Homes

passive houseAn American home-building movement in the 1970s innovated ways to trap energy in homes to reduce the cost of heating them, as explained by Wooden Window.

The strategy of a Passive House is to reuse “free” heat to warm the home. “Free” heat is generated from all electrical and gas appliances such ovens, refrigerators, computers and light bulbs. To do this, the building envelope of a Passive House must be extremely well insulated and air-tight so that this “free” heat can be captured and [retained] within the building.

Two documentaries now try to explain how it works and why the concept has been so popular in Europe but mostly ignored in America. Catch them both at the PHCA film festival on August 9th.

Perhaps someone could make it instantly more popular in America if they changed the uninspired name Passive House to something more like Independence House or Freedom House…or Ultimate-Super-Extreme-Big-Heat-Like-a-Soaring-Bald-Eagle-on-Thermal-Power House. I’d want that.

“Air tight” affordable homes of course have another interesting effect on security strategy. Filtering and measuring the air flow between a sealed dwelling and the environment could completely change air-quality governance and disaster planning.

The Finnish Kalevala Runo

Sweden began rule over Finland in the 13th century. As the ruling monarchy adopted Christianity in the 16th century they began to attack traditions in Finland and to destroy pagan rituals, as I also wrote last year.

Not all was lost. The following video is of Jussi Huovinen who is said to be one of the only people able to sing a traditional rune of Finland that could be as old as 1000 BCE.

National Geographic explains the significance

A collection of these runes, comparable to India’s Ramayana, or the Greek Odyssey, is known in Finland as the Kalevala, and those who sing its lyrical verses from memory are known as rune singers. These elders long carried in their minds the entire record of the Finnish language.

“In an oral tradition, the total richness of the language is no more than the vocabulary of the best storyteller,” Davis explains. “In other words, at any one point in time the boundaries of the language are being stretched according to the memory of the best storyteller.”

The video and the article both speak of how the information is written permanently to memory. It begs the question of the strength of controls in poetry and story-telling (alliteration, consonance, rhyme, rhythm, hymn, repetition).

Kalevala has eight syllables per line, stressing every other one (using rules similar to trochaic tetrametre).

Syllables fall into three types: strong, weak, and neutral. A long syllable (one that contains a long vowel or a diphthong, or ends in a consonant) with a main stress is metrically strong, and a short syllable with a main stress is metrically weak. All syllables without a main stress are metrically neutral. A strong syllable can only occur in the rising part of the second, third, and fourth foot of a line.

Amazing how we can have confidence in this data storage integrity method; that a story remains the same over thousands of years when no one but a few, or even just one, can remember them.